Maria Korolov

Contributing writer

Maria Korolov has been covering emerging technology and emerging markets for the past 20 years.

Top 5 security risks of Open RAN

6 signs your IAM strategy is failing, and how to fix it

6 signs your IAM strategy is failing, and how to fix it

Mistakes when implementing identity and access management systems, especially during upgrades, can have lasting effects. Here's how to spot and avoid the worst of them.

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Adversarial machine learning explained: How attackers disrupt AI and ML systems

Threat actors have several ways to fool or exploit artificial intelligence and machine learning systems and models, but you can defend against their tactics.

9 ways hackers will use machine learning to launch attacks

9 ways hackers will use machine learning to launch attacks

Machine learning algorithms will improve security solutions, helping human analysts triage threats and close vulnerabilities quicker. But they are also going to help threat actors launch bigger, more complex attacks.

7 machine identity management best practices

7 machine identity management best practices

Managing machine identities can be just as important as managing human identities, especially in a zero-trust environment.

What is the cyber kill chain? A model for tracing cyberattacks

What is the cyber kill chain? A model for tracing cyberattacks

The cyber kill chain describes the phases of a targeted cyberattack where defenders can identify and stop it.

Gartner: SSE is SASE minus the SD-WAN

Gartner: SSE is SASE minus the SD-WAN

Security service edge (SSE) bundles a cloud access security broker, secure web gateway and ZTNA, according to Gartner.

How attackers sidestep the cyber kill chain

How attackers sidestep the cyber kill chain

Many of the most popular cyberattacks don't follow all the steps of the cyber kill chain, but you have other methods to detect threats.

Why DevOps pipelines are under attack and how to fight back

Why DevOps pipelines are under attack and how to fight back

NotPetya proved the effectiveness of an attack on the software supply chain, and attackers are targeting it more now. Here's advice to reduce risk to your DevOps processes.

Data residency laws pushing companies toward residency as a service

Data residency laws pushing companies toward residency as a service

Many countries now require companies that operate within its boundaries to store data on their residents locally. Using residency-as-a-service providers is becoming an important option.

Supply chain attacks show why you should be wary of third-party providers

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Ransomware recovery: 8 steps to successfully restore from backup

Ransomware recovery: 8 steps to successfully restore from backup

The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it.

Load More