Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

4 top challenges to a secure digital transformation

What is a botnet? And why they aren't going away anytime soon

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

What are next generation firewalls? How the cloud and complexity affect them

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

Corporate pre-crime: The ethics of using AI to identify future insider threats

Corporate pre-crime: The ethics of using AI to identify future insider threats

Remember “Minority Report”? Artificial intelligence can spot employee behavior that suggests a future risk. Here’s how to use that data ethically and effectively.

The best antivirus software? Kaspersky, Bitdefender and Trend Micro lead in latest tests

The best antivirus software? Kaspersky, Bitdefender and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

3 reasons companies fail to assess the scope of a data breach

3 reasons companies fail to assess the scope of a data breach

Best advice: Understand your data, have proper event logging in place, and test your incident response plan. (You do have one, don’t you?)

California Consumer Privacy Act: What you need to know to be compliant

California Consumer Privacy Act: What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

Keeping pace with security automation

Keeping pace with security automation

Stressed and stretched, IT security teams look to automation for relief.

5 ways to hack blockchain in the enterprise

5 ways to hack blockchain in the enterprise

Experts warn of blockchain security risks in non-cryptocurrency use cases.

Hardware, software options emerge for runtime encryption

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

Cloud functions present new security challenges

Cloud functions present new security challenges

Cloud functions, or serverless apps, are small, fast and pop in and out of existence. So, how do you secure them?

How privacy is moving data security to the top of corporate agendas

How privacy is moving data security to the top of corporate agendas

It’s no longer privacy vs security. Regulations like GDPR and customer data breaches have joined privacy and security efforts at the hip.

Load More