Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

Why securing containers and microservices is a challenge

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

AI in the supply chain: Logistics gets smart

AI in the supply chain: Logistics gets smart

Interest in machine learning and AI for SCM is increasing as companies envision a more predictable, automated future for logistics and distribution.

New AI tools make BI smarter — and more useful

New AI tools make BI smarter — and more useful

Data science democratized: What used to take data scientists months to prepare may soon be put together in a few days by data-astute business users.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

How to detect and prevent crypto mining malware

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

SEC's new cybersecurity guidance falls short

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

AI’s biggest risk factor: Data gone wrong

AI’s biggest risk factor: Data gone wrong

Bad data is big issue for artificial intelligence, and as businesses increasingly embrace AI, the stakes will only get higher. Here’s how not to get burned.

How AI will impact your IT career

How AI will impact your IT career

AI is fast becoming a go-to technology for business transformation, shaking up roles across the enterprise. Here’s how to make the most of this inevitable evolution.

Password managers grow up, target business users

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.

Unlimited DDoS protection the new norm after Cloudflare announcement

Unlimited DDoS protection the new norm after Cloudflare announcement

With Cloudflare ending surge pricing for DDoS protection services, all website owners are protected equally and potential attack damage is limited.

What is a fileless attack? How hackers invade systems without installing software

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.

Look beyond job boards to fill cybersecurity jobs

Look beyond job boards to fill cybersecurity jobs

The cybersecurity staffing shortage is reaching crisis proportions, and companies are looking beyond the traditional channels of job boards and headhunters to find and hire new talent. Here are some of the unconventional ways...

With new dynamic capabilities, will whitelisting finally catch on?

With new dynamic capabilities, will whitelisting finally catch on?

In this age of destructive and fast-spreading malware, companies are giving whitelisting a second look -- and with cloud-based, peer-to-peer whitelists and reputation scoring, the technology now has a chance to be widely adopted.

Few firms will be ready for new European breach disclosure rules, fines

Few firms will be ready for new European breach disclosure rules, fines

The new European General Data Protection Regulation goes into effect next May, with onerous notification requirements and high penalties, but a year might not be enough for firms to get ready

APT3 hackers linked to Chinese intelligence

APT3 hackers linked to Chinese intelligence

The APT3 hacker group, which has been attacking government and defense industry targets since 2010, has been linked to the Chinese Ministry of State Security, according to a report by Recorded Future.

Be wary of fake WannaCry fixes

Be wary of fake WannaCry fixes

When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise

Suffolk County greets hurricane season with updated alerting system

Suffolk County greets hurricane season with updated alerting system

Last September, as the East Coast prepared for Tropical Storm Hermine, the emergency broadcasting system accidentally sent out an evacuation alert for all of Long Island's Suffolk County. The alert was meant just for Fire Island, but...

Cybercrooks fight over DDoS attack resources

Cybercrooks fight over DDoS attack resources

As more groups get into the denial-of-service attack business they're starting to get in each other's way, according to a report released this morning. That translates into a smaller average attack size.

Ad network takes steps to reduce fraud

Ad network takes steps to reduce fraud

Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8...

Load More