Josh Fruhlinger is a writer and editor who has been covering technology since the first dot-com boom. His interests include cybersecurity, programming tools and techniques, internet and open source culture, and what causes tech projects to fail. He won a 2025 AZBEE Award for a feature article on refactoring AI code and his coverage of generative AI earned him a Jesse H. Neal Award in 2024. In 2015 he published The Enthusiast, a novel about what happens when online fan communities collide with corporate marketing schemes. He lives in Los Angeles.
Agentic AI is already changing how security operations centers function, handling repeatable tasks and freeing analysts for higher-level investigations. But trust, pricing, and oversight remain critical issues.
From leaked credentials to ransomware plans, the dark web is full of early warning signs — if you know where and how to look. Here’s how security leaders can monitor these hidden spaces and act before an attack hits.
The chief information security officer (CISO) is the executive responsible for an organization’s information and data security. Here’s what it takes to succeed in this role.
As generative AI transforms business, security experts are adapting hacking techniques to discover vulnerabilities in intelligent systems — from prompt injection to privilege escalation.
Security experts say that automation can work, but works only if it’s implemented deliberately, monitored, and guided by humans.
Mobile security often is tighter than PC security, but users can still be fooled by social engineering techniques, and smartphones can still be hacked. Here’s what to watch out for.
Endpoint detection and response (EDR) empowers security teams to identify and eliminate threats that evade traditional antivirus software, offering crucial visibility and response capabilities.
From cyberthreats to financial volatility, security leaders must grasp the nuances of risk management to build resilient and successful organizations.
Sponsored Links