Stories by Josh Fruhlinger

How EDR stops hackers in their tracks

EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behaviour.

Written by Josh Fruhlinger08 Nov. 19 22:00

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers.

Written by Josh Fruhlinger30 Sept. 19 20:00

What is opsec? A process for protecting critical information

Opsec, which stands for operations security, is a process by which organizations assess and protect public data about themselves that could, if properly analyzed and grouped with other data by a clever adversary, reveal a bigger picture that ought to stay hidden.

Written by Josh Fruhlinger08 May 19 20:00

What is digital forensics? And how to land a job in this hot field

Digital forensics is the application of scientific investigatory techniques to digital crimes and attacks. Think beyond the awful (and justly cancelled) TV show CSI Cyber; digital forensics is a crucial aspect of law and business in the internet age and can be a rewarding and lucrative career path.

Written by Josh Fruhlinger25 Jan. 19 22:00

How to lead a virtual team: 5 keys for success

You've got the tools, you've navigated the logistical hurdles, but you still may not be leading your remote team in the most effective way possible. Here's how to get virtual teams right.

Written by Josh Fruhlinger31 May 18 20:02

5 top trends in endpoint security for 2018

Endpoint security is a rapidly developing category, as organizations look to coordinate control of the PCs, servers and phones on their networks to keep out malware and intruders. Let's look at what the year ahead has in store.

Written by Josh Fruhlinger25 May 18 08:06

5 top trends in endpoint security for 2018

Endpoint security is focused on locking down endpoints — individual computers, phones, tablets and other network-enabled devices — in order to keep networks safe. Of course, as threats evolve, endpoint security suites must evolve as well.

Written by Josh Fruhlinger11 May 18 20:15