Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

California Consumer Privacy Act (CCPA): What you need to know to be compliant

SASE helps healthcare company pivot to support remote workers

SASE helps healthcare company pivot to support remote workers

TrialCard rolls out secure access service edge (SASE), which combines SD-WAN capabilities with network security services.

SASE could bolster security for remote workers

SASE could bolster security for remote workers

COVID-19 has accelerated some companies' plans to adopt secure access service edge (SASE), which combines SD-WAN capabilities with network security services.

Best antivirus software: 13 top tools

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

Enterprises roll out private 5G while standards, devices, coverage evolve

Enterprises roll out private 5G while standards, devices, coverage evolve

Early adopters are beginning to test private 5G deployments, inspired by the promise of superior performance and support for previously infeasible applications.

5G is poised to transform manufacturing

5G is poised to transform manufacturing

5G wireless holds much promise for manufacturing facilities, largely for its speed and low latency, so a few early adopters are buying into the technology, but its pervasive use in factories is still years off.

Private 5G keeps Whirlpool driverless vehicles rolling

Private 5G keeps Whirlpool driverless vehicles rolling

When interference disrupted the Wi-Fi guidance for driverless vehicles in one of its factories, bringing the vehicles to a halt and backing up production, Whirlpool turned to on-premises 5G through a partnership with AT&T.

What is a botnet? When armies of infected IoT devices attack

What is a botnet? When armies of infected IoT devices attack

A botnet is a collection of internet-connected devices that an attacker has compromised. Commonly used in distributed denial of service (DDoS) attacks, botnets can also take advantage of their collective computing power to send large...

Google expands cloud security capabilities, including simpler configuration

Google expands cloud security capabilities, including simpler configuration

New tools and services will help make it easier for enterprises to manage security with Google products as well as with Amazon and in their own private clouds and applications.

What is quantum cryptography? It’s no silver bullet, but could improve security

What is quantum cryptography? It’s no silver bullet, but could improve security

In the arms race between white and black hats, the infosec industry looks to quantum cryptography and quantum key distribution (QKD). That may be just part of the answer, however.

What is biometrics? 10 physical and behavioral identifiers that can be used for authentication

What is biometrics? 10 physical and behavioral identifiers that can be used for authentication

Biometrics are physical or behavioral human characteristics to that can be used to digitally identify a person to grant access to systems, devices or data. It has the potential to make authentication dramatically faster, easier and...

What is a supply chain attack? Why you should be wary of third-party providers

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Load More