Maria Korolov

Contributing writer

Maria Korolov has been covering emerging technology and emerging markets for the past 20 years.

NTT, Palo Alto partner for managed SASE with AIOps

How AI chatbot ChatGPT changes the phishing game

How AI chatbot ChatGPT changes the phishing game

The Microsoft-backed free chatbot is improving fast and can not only write emails, essays but can also code. ChatGPT is also polyglot and that could facilitate and increase exponentially phishing attacks.

CPRA explained: New California privacy law ramps up restrictions on data use

CPRA explained: New California privacy law ramps up restrictions on data use

The California Privacy Rights Act (CPRA) is a new law that toughens some data security requirements, brings California more in line with Europe's General Data Protection Regulation, and creates a new state agency—the California...

The cybersecurity challenges and opportunities of digital twins

The cybersecurity challenges and opportunities of digital twins

The virtual representation of objects or systems through digital twins provide organizations greater insight into their assets but it can also invite malicious actors.

Tips on securing IoT devices gleaned from enterprises that use them

Tips on securing IoT devices gleaned from enterprises that use them

IoT devices pose significant threats to enterprises because of lack of visibility into what devices are on enterprise networks and inadequate use of monitoring tools to watch for malicious behaviors.

Top 5 security risks of Open RAN

Top 5 security risks of Open RAN

Open RAN enables interoperability among hardware, software, and interfaces used in cellular networks but also changes their attack surface.

6 signs your IAM strategy is failing, and how to fix it

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

7 machine identity management best practices

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

What is the cyber kill chain? A model for tracing cyberattacks

What is the cyber kill chain? A model for tracing cyberattacks

The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.

Gartner: SSE is SASE minus the SD-WAN

Gartner: SSE is SASE minus the SD-WAN

Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.

Load More