Josh Fruhlinger is a writer and editor who lives in Los Angeles.
The best way to deal with risk is to understand what you’re up against and embrace its upside. An enterprise risk management program can help you do just that.
Distributed denial of service (DDoS) attacks have been part of the criminal toolbox for decades — and they’re only growing more prevalent and stronger.
Ransomware is a form of malware that encrypts or blocks access to a victim’s files, data, or systems until a ransom is paid. Here’s what you need to know to avoid being a victim and what to do if you fall prey to cyber criminals.
Pretexting is a social engineering attack that employs a fabricated scenario and character impersonation to win trust and gain access to data and accounts under false pretexts.
Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet.
The CIA (confidentiality, integrity, availability) triad is a widely used information security model that can guide an organization’s efforts and policies aimed at keeping its data secure — but tradeoffs are necessary in real-world scenar
To what extent is ISACA’s Certified in Risk and Information Systems Control a gateway to high-level IT security leadership roles? Check out our CRISC certification guide to find out.
A tabletop exercise is a discussion-based session to test your team on roles and responses during for emergency scenarios. Here are example scenarios and tips to help tune your team for response success.