James A. Martin

James A. Martin is a seasoned tech journalist and blogger based in San Francisco and winner of the 2014 ASBPE National Gold award for his CIO.com blog. He writes CIO.com's Living the Tech Life blog and is also a content marketing consultant.

Best Android antivirus? The top 11 tools

28 DevSecOps tools for baking security into the development process

28 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.

Top 10 global cybersecurity hubs for 2019

Top 10 global cybersecurity hubs for 2019

Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders.

What is shadow IoT? How to mitigate the risk

What is shadow IoT? How to mitigate the risk

When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.

What is IAM? Identity and access management explained

What is IAM? Identity and access management explained

IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.

5 things to know about fitness trackers and security in 2018

5 things to know about fitness trackers and security in 2018

Activity trackers, including dedicated fitness trackers and smartwatches, can expose enterprise networks if not properly managed and connected.

What is access control? A key component of data security

What is access control? A key component of data security

Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

12 famous (and infamous) IT security disasters

12 famous (and infamous) IT security disasters

Arrogance and excessive pride may be the deadly sins of IT security

7 things your IT disaster recovery plan should cover

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for...

Who is a target for ransomware attacks?

Who is a target for ransomware attacks?

While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.

How to spot and prevent insider threats

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know about detecting insider threats and better protecting your enterprise network and proprietary information.

How to keep virtual assistants from sharing your company's secrets

How to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?

Load More