Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

How to protect backups from ransomware

Supply chain attacks show why you should be wary of third-party providers

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

IBM, Intel, AMD take different routes to hardware-based encryption

IBM, Intel, AMD take different routes to hardware-based encryption

So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs.

Getting started with security automation

Getting started with security automation

Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here's how three organizations started on the path to automated incident response.

How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

The California Consumer Privacy Act (CCPA) is a law that allows any California consumer to demand to see all the information a company has saved on them, as well as a full list of all the third parties that data is shared with.

8 ways 5G mobile networks will change IoT security, and how to prepare

8 ways 5G mobile networks will change IoT security, and how to prepare

Every internet of things security issue will be greatly magnified in a 5G environment. Address these eight areas before you deploy your own.

8 ways to get more life out of an old SIEM

8 ways to get more life out of an old SIEM

Can't update your old security information and event management system now? Use this advice to maintain its effectiveness.

AI-powered deception technology speeds deployment, improves results

AI-powered deception technology speeds deployment, improves results

Aflac says artificial intelligence made its honeypot rollout faster and less complicated, and produces high-quality alerts. A healthcare facility rolls out deception technology for protection during the COVID crisis.

Best antivirus software: 13 top tools

Best antivirus software: 13 top tools

These top-ranking Windows 10 client antivirus products were tested on three primary criteria: protection, performance and usability.

8 PCI DSS questions every CISO should be able to answer

8 PCI DSS questions every CISO should be able to answer

PCI DSS is a standard backed by all the major credit cards and payment processors that is designed to protect credit card numbers. It specifies a set of cybersecurity controls and business practices and requires either...

Complying with CCPA: Answers to common questions

Complying with CCPA: Answers to common questions

Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss...

Load More