Josh Fruhlinger

Contributing writer

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

Protecting PII: Examples, laws, and standards

The 7 best password managers for business

The 7 best password managers for business

A password manager stores a user’s passwords and logins for various sites and apps and generates new, strong passwords, making it a valuable tool for implementing strong passwords in your business.

How IPsec works, it’s components and purpose

How IPsec works, it’s components and purpose

IPsec (Internet Protocol Security) is a suite of protocols that are used to secure internet communications. It is a common element of VPNs.

8 top penetration testing certifications employers value

8 top penetration testing certifications employers value

If you're looking for a job as a penetration tester, these certs will help you demonstrate your hacking skills and your commitment to the field.

11 penetration testing tools the pros use

11 penetration testing tools the pros use

Automated and open source tools can help you conduct web application, network, and database penetration tests.

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing explained: How ethical hackers simulate attacks

Penetration testing is a means of evaluating the security of a network or computer system by attempting to break into it. It is an exercise undertaken by professional pen testers (aka ethical hackers) with the permission of the...

6 security analyst certifications to advance your career

6 security analyst certifications to advance your career

Whether you're just starting out in your security career or you're on your way to the top, these certs can give you a leg up.

How to hack a phone: 7 common attack methods explained

How to hack a phone: 7 common attack methods explained

Mobile security often beats PCs, but users can still be fooled and smartphones can still be hacked. Here’s what you need to watch for.

10 essential skills and traits of ethical hackers

10 essential skills and traits of ethical hackers

Learn just what it takes to snag this demanding and rewarding job.

Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

Whether you're finding bargains online or taking advantage of your own internal resources, you can keep your team up-to-date without writing a big check.

SAML explained: How this open standard enables single sign on

SAML explained: How this open standard enables single sign on

Security Assertion Markup Language (SAML) is a standard that defines how providers can offer both authentication and authorization services. Here's what you need to know.

CRISC certification: Your ticket to the C-suite?

CRISC certification: Your ticket to the C-suite?

Certified in Risk and Information Systems Control (CRISC) is a certification that focuses on enterprise IT risk management. Learn about the exam, prerequisites, study guides, and potential salary.

Load More