Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

Ransomware recovery: 8 steps to successfully restore from backup

Botnet attacks on APIs: Why most companies are unprepared

Botnet attacks on APIs: Why most companies are unprepared

The use of botnets to target applications for illegal and unethical purposes is growing, yet implementation of bot detection tools and best practices lags.

How API attacks work, and how to identify and prevent them

How API attacks work, and how to identify and prevent them

Attackers know how to get around WAFs and API gateways when targeting APIs. Here's how some companies are coping with the rapid increase in API attacks.

Tips and tactics of today's cybersecurity threat hunters

Tips and tactics of today's cybersecurity threat hunters

Having internal threat hunting capability is becoming a necessity for many organizations. Here are the most common things they look for and how they respond to incidents.

How strong, flexible data protection controls can help maintain regulatory compliance

How strong, flexible data protection controls can help maintain regulatory compliance

An effective approach to data protection controls embraces ethical standards and anticipates new requirements. Here’s how some CISOs and other experts tackle the issue.

5 ways attackers counter incident response, and how to stop them

5 ways attackers counter incident response, and how to stop them

IR has become a chess match with attackers who can cleverly spoil responders' efforts and keep a foothold in systems. Here's how they do it and how to kick them out for good.

Supply chain attacks show why you should be wary of third-party providers

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

CPRA explained: New California privacy law ramps up restrictions on data use

CPRA explained: New California privacy law ramps up restrictions on data use

The California Privacy Rights Act (CPRA) is a new law that toughens some data security requirements, brings California more in line with Europe's General Data Protection Regulation, and creates a new state agency—the California...

How secure are your AI and machine learning projects?

How secure are your AI and machine learning projects?

Artificial intelligence and machine learning bring new vulnerabilities along with their benefits. Here's how experts minimized their risk.

How to protect backups from ransomware

How to protect backups from ransomware

Ransomware is getting smarter, attacking backups to prevent recovery. Prevent this from happening by taking a few simple steps.

IBM, Intel, AMD take different routes to hardware-based encryption

IBM, Intel, AMD take different routes to hardware-based encryption

So-called confidential computing approaches allow data to remain encrypted while in use. That's best done in hardware, and IBM, AMD and Intel are following different paths, each with its own trade-offs.

Getting started with security automation

Getting started with security automation

Stressed and stretched, IT security teams look to automation for relief from high volumes of alerts from their detection and response systems. Here's how three organizations started on the path to automated incident response.

Load More