Josh Fruhlinger

Josh Fruhlinger is a writer and editor who lives in Los Angeles.

CISSP certification guide: Requirements, training, and cost

GLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT security

GLBA explained: What the Graham-Leach-Bailey Act means for privacy and IT security

The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had been banned since the Great Depression. It has an infosec reach that goes...

The Sarbanes-Oxley Act explained: Definition, purpose, and provisions

The Sarbanes-Oxley Act explained: Definition, purpose, and provisions

The Sarbanes-Oxley Act (sometimes referred to as SOA, Sarbox, or SOX) is a U.S. law passed in 2002 that aimed to protect investors by preventing fraudulent accounting and financial practices at publicly traded companies.

What is swatting? Unleashing armed police against your enemies

What is swatting? Unleashing armed police against your enemies

Swatting is a form of harassment that uses prank calls to send police SWAT teams into victims' homes. Here's what you need to know about this dangerous practice.

10 organizations that promote diversity in infosec

10 organizations that promote diversity in infosec

These groups are helping ensure that everyone has a seat at the table

CISM certification guide: Requirements, prerequisites, and cost

CISM certification guide: Requirements, prerequisites, and cost

Certified Information Security Manager, or CISM, is a certification for advanced IT professionals who want to demonstrate that they can develop and manage an infosec program at the enterprise level.

What is cryptography? How algorithms keep information secret and safe

What is cryptography? How algorithms keep information secret and safe

Cryptography is the science of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.

Identity theft explained: Why businesses make tempting targets

Identity theft explained: Why businesses make tempting targets

Identity theft is the use of someone else's personal information without permission, typically to conduct financial transactions. Here's what you need to know to protect yourself and your organization.

8 top open source intelligence tools

8 top open source intelligence tools

OSINT (open source intelligence) is the practice of collecting information from published or otherwise publicly available sources. These tools will help you find sensitive public info before bad guys do.

What is phishing? How this cyber attack works and how to prevent it

What is phishing? How this cyber attack works and how to prevent it

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

What is doxing? Weaponizing personal information

What is doxing? Weaponizing personal information

Doxing (or doxxing) is the practice of posting someone's personal information online without their consent and typically with the intention to intimidate, humiliate, or harass the victim.

PCI DSS explained: Requirements, fines, and steps to compliance

PCI DSS explained: Requirements, fines, and steps to compliance

PCI DSS is a cybersecurity standard backed by all the major credit card and payment processing companies that aims to keep credit and debit card numbers safe.

Load More