

James A. Martin
James A. Martin is a seasoned tech journalist and blogger based in San Francisco and winner of the 2014 ASBPE National Gold award for his CIO.com blog. He writes CIO.com's Living the Tech Life blog and is also a content marketing consultant.

Best Android antivirus? The top 8 tools
There are plenty of antivirus tools for Android. Here's how the top 8 measure up in protection, usability and features.

The 25 worst passwords of 2019, and 8 tips for improving password security
Blacklist these 25 passwords now and use these tips to improve enterprise password security.

7 mobile security threats that may catch you by surprise
Even if you're usually savvy about cybersecurity, anyone can have a vulnerable moment (in our writer's case, it was his mother's funeral).

7 cloud security controls you should be using
Human error is one of the top reasons for data breaches in the cloud, as administrators forget to turn on basic security controls. Whether it is Amazon Web Services, Microsoft Azure, or Google Cloud Platform, keep these rules in mind...

What is access control? A key component of data security
Access control is a method of guaranteeing that users are who they say they are and that they have the appropriate access to company data. It is a vital aspect of data security, but it has some significant enforcement challenges.

Developing personal OPSEC plans: 10 tips for protecting high-value targets
Attackers are increasingly targeting executives and employees who have access to sensitive enterprise data. Here's how to protect those individuals with personal OPSEC plans.

28 DevSecOps tools for baking security into the development process
Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.

Top 10 global cybersecurity hubs for 2019
Many cities and regions are vying for the title of Cybersecurity Capital. Here are 10 of the leading and emerging contenders.

What is shadow IoT? How to mitigate the risk
When someone in your organization starts using internet-connected devices without IT’s knowledge, that’s shadow IoT. Here's what you need to know about its growing risk.

What is IAM? Identity and access management explained
IAM products provide IT managers with tools and technologies for controlling user access to critical information within an organization.
