James A. Martin

James A. Martin is a seasoned tech journalist and blogger based in San Francisco and winner of the 2014 ASBPE National Gold award for his CIO.com blog. He writes CIO.com's Living the Tech Life blog and is also a content marketing consultant.

What is IAM? Identity and access management explained

Best Android antivirus? The top 12 tools

Best Android antivirus? The top 12 tools

There are plenty of antivirus tools for Android. Here's how the top 12 measure up in protection, usability and features.

5 things to know about fitness trackers and security in 2018

5 things to know about fitness trackers and security in 2018

Activity trackers, including dedicated fitness trackers and smartwatches, can expose enterprise networks if not properly managed and connected.

What is access control? 5 enforcement challenges security professionals need to know

What is access control? 5 enforcement challenges security professionals need to know

Access controls authenticate and authorize individuals to access the information they are allowed to see and use.

12 famous (and infamous) IT security disasters

12 famous (and infamous) IT security disasters

Arrogance and excessive pride may be the deadly sins of IT security

7 things your IT disaster recovery plan should cover

7 things your IT disaster recovery plan should cover

Enterprise networks and data access can be knocked out without warning, thanks to natural and man-made disasters. You can’t stop them all from happening, of course, but with a good disaster recovery plan you can be better prepared for...

Who is a target for ransomware attacks?

Who is a target for ransomware attacks?

While any enterprise is a possible ransomware target, some are more likely than others to be caught in a cybercriminal’s crosshairs.

How to spot and prevent insider threats

How to spot and prevent insider threats

Are departing employees taking data with them? Here’s what you need to know about detecting insider threats and better protecting your enterprise network and proprietary information.

How to keep virtual assistants from sharing your company's secrets

How to keep virtual assistants from sharing your company's secrets

Consumers love talking to Alexa, Siri, Cortana and Google Now. But what should CIOs be doing to prepare for the growing use of virtual assistants among their employees?

10 security risks of wearables

10 security risks of wearables

Fitness trackers may not present a huge security risk, but any connected device can be hacked. Here’s what you need to know to minimize those security and privacy threats.

 Experts bust Android security myths

Experts bust Android security myths

A set of mobile security experts provides insight on the current state of Android security.

8 Android security tips for IT, corporate users

8 Android security tips for IT, corporate users

A set of security experts shares actionable tips for IT departments and users to help reduce the risk associated with the popular mobile OS.

Load More