Media Database
>
Josh Fruhlinger

Josh Fruhlinger

Freelance Writer & Editor at CSO

Contact this person
Email address
j*****@*******.comGet email address
Influence score
46
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Languages
  • English
Covering topics
  • Security
  • Computers & Technology

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

csoonline.com

Certified ethical hacker: CEH certification cost, training, and value

Learn how CEH certification will impact your job and salary and how to decide if this cert is right for you.
csoonline.com

CompTIA Security+: Prerequisites, objectives, and cost

Learn how CompTIA Security+ certification will impact your job and salary and how to decide if this cert is right for you.
csoonline.com

Tabletop exercise scenarios: 3 real-world examples

Tabletop exercises are a low-stress, high-impact way to test your plans for handling a crisis. Here are some tips for getting the most out of the process, plus six scenarios you can use to start your journey.
thesource.metro.net

A note from Metro CEO Stephanie Wiggins on fares, enforcement and s...

Dear Riders, On Sunday, Metro Bus and Rail service changes went into effect — with more frequent service on many bus lines, as well as our light rail trains. Metro also resumed front door boarding …
csoonline.com

10 old software bugs that took way too long to squash

As these examples show, vulnerabilities can lurk within production code for years or decades—and attacks can come at any time.
csoonline.com

HITRUST explained: One framework to rule them all

HITRUST is a cybersecurity framework that seeks to unify the rules for many other existing regulatory and industry frameworks, including HIPAA, GDPR, PCI-DSS, and more.
csoonline.com

What is a CSO? Understanding the critical chief security officer role

The CSO is the executive responsible for the organization’s entire security posture, both physical and cyber, and has the big picture view of the company’s operational risk.
networkworld.com

802.1X: What you need to know about this LAN-authentication standard

The IEEE 802.1X standard integrates enterprise authentication into wired or wireless LANs.
csoonline.com

10 most common passwords of 2020 (and 10 tips for better security)

Banish these common passwords now and employ these tips for better password security.
csoonline.com

What is a zero day? Definition, examples, and defense

A zero day is a security flaw that has not yet been patched by the vendor and can be exploited. The name evokes a scenario where an attacker has gotten the jump on a software vendor, implementing attacks that exploit the flaw before the good guys of infosec are able to respond.
csoonline.com

What is a CISO? Responsibilities and requirements for this vital role

The chief information security officer (CISO) is the executive responsible for an organization’s information and data security. Learn what it takes to land a CISO job and how to be successful in the role.
csoonline.com

What is the HITECH Act? Definition, compliance, and violations

The Health Information Technology for Economic and Clinical Health (HITECH) Act aims to expand the use of electronic health records through incentives to health care providers and consumers. It also tightens rules on providers to ensure that EHRs remain private and secure.
csoonline.com

What is HIPAA? Definition, compliance, and violations

HIPAA (the Health Insurance Portability and Accountability Act) is a law passed in 1996 that imposes stringent privacy and security mandates on health care providers—and most of their IT vendors.
csoonline.com

GLBA explained: Definition, requirements, and compliance

The Graham-Leach-Bailey Act (GLBA) is a 1999 law that allowed financial services companies to offer both commercial and investment banking, something that had been banned since the Great Depression. It has an infosec reach that goes far beyond the financial services industry.
networkworld.com

What is a WAN? Wide-area network definition and examples

WANs connect smaller networks across long distances, and their architecture, protocols and technologies have evolved to their latest incarnation, SD-WAN.
networkworld.com

What are data centers? How they work and how they are changing in s...

The future of data centers will rely on cloud, hyperconverged infrastructure and more powerful devices.
csoonline.com

What is cryptography? How algorithms keep information secret and safe

Cryptography is the science of keeping information secret and safe by transforming it into form that unintended recipients cannot understand. It makes secure data transmission over the internet possible.
csoonline.com

PCI DSS explained: Requirements, fines, and steps to compliance

PCI DSS is a cybersecurity standard backed by all the major credit card and payment processing companies that aims to keep credit and debit card numbers safe.
csoonline.com

Whitelisting explained: How it works and where it fits in a securit...

Whitelisting is a cybersecurity strategy under which a user can only take actions on their computer that an administrator has explicitly allowed in advance. It is a fairly extreme measure with high administrative overhead, but it makes sense in certain scenarios.
polygon.com

Should the funny pages look like the news?

Newspaper comic strips find themselves rethinking slice-of-life comedy
networkworld.com

What is IoT? The internet of things explained

The internet of things (IoT) is a network of connected smart devices providing rich data, but it can also be a security nightmare.