Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

The best antivirus software? Kaspersky, Symantec and Trend Micro lead in latest tests

How privacy is moving data security to the top of corporate agendas

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Why securing containers and microservices is a challenge

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

AI in the supply chain: Logistics gets smart

AI in the supply chain: Logistics gets smart

Interest in machine learning and AI for SCM is increasing as companies envision a more predictable, automated future for logistics and distribution.

New AI tools make BI smarter — and more useful

New AI tools make BI smarter — and more useful

Data science democratized: What used to take data scientists months to prepare may soon be put together in a few days by data-astute business users.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

What is a supply chain attack? Why you should be wary of third-party providers

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

How to detect and prevent crypto mining malware

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

SEC's new cybersecurity guidance falls short

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

The global cyber war is heating up: Why businesses should be worried

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

AI’s biggest risk factor: Data gone wrong

AI’s biggest risk factor: Data gone wrong

Bad data is big issue for artificial intelligence, and as businesses increasingly embrace AI, the stakes will only get higher. Here’s how not to get burned.

New cryptocurrencies offer better anonymity, new security challenges

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

Load More