Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

What is a supply chain attack? Why you should be wary of third-party providers

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

How to detect and prevent crypto mining malware

How to detect and prevent crypto mining malware

Hackers are placing crypto mining software on devices, networks, and websites at an alarming rate. These tools can help spot it before it does great harm.

Open source software security challenges persist

Open source software security challenges persist

Using open source components saves developers time and companies money. In other words, it's here to stay. Here's a look at what it will take to improve open source security.

SEC's new cybersecurity guidance falls short

SEC's new cybersecurity guidance falls short

Post Equifax, those who hoped that the US Securities and Exchange Commission would impose tougher rules (and consequences for breaking them) around reporting breaches will be disappointed.

The global cyber war is heating up: Why businesses should be worried

The global cyber war is heating up: Why businesses should be worried

From NotPetya's global disruption to North Korea's digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here's how to defend against them.

New cryptocurrencies offer better anonymity, new security challenges

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

Cloud security configuration errors put data at risk; new tools can help

Cloud security configuration errors put data at risk; new tools can help

As more and more companies move to the cloud, misconfigured services are putting data and systems at risk. New management tools can help.

Password managers grow up, target business users

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.

How hackers crack passwords and why you can't stop them

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

What is the cyber kill chain? Why it's not always the right approach to cyber attacks

The cyber kill chain breaks down each stage of a malware attack where you can identify and stop it, but be aware of how attack strategies are changing.

Is your data being sold on the dark web?

Is your data being sold on the dark web?

Monitoring the dark web to see if your data is being sold there is risky, but solutions and services are available to help.

How AI can help you stay ahead of cybersecurity threats

How AI can help you stay ahead of cybersecurity threats

Artificial intelligence and machine learning can be force multipliers for under-staffed security teams needing to respond faster and more effectively to cyber threats.

Unlimited DDoS protection the new norm after Cloudflare announcement

Unlimited DDoS protection the new norm after Cloudflare announcement

With Cloudflare ending surge pricing for DDoS protection services, all website owners are protected equally and potential attack damage is limited.

Shadow cloud apps pose unseen risks

Shadow cloud apps pose unseen risks

When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.

What is a fileless attack? How hackers invade systems without installing software

What is a fileless attack? How hackers invade systems without installing software

Cyber criminals don't need to place malware on your system to get in. Fileless or zero-footprint attacks use legitimate applications or even the operating system.

Is universal end-to-end encrypted email possible (or even desirable)?

Is universal end-to-end encrypted email possible (or even desirable)?

End-to-end email encryption is getting more attention as security and compliance concerns mount, but practical use cases are rapidly being eaten away by other technologies.

What’s new in ransomware?

What’s new in ransomware?

Ransomware attacks--and defenses against them--are evolving fast, but enterprises still struggle to keep up.

Look beyond job boards to fill cybersecurity jobs

Look beyond job boards to fill cybersecurity jobs

The cybersecurity staffing shortage is reaching crisis proportions, and companies are looking beyond the traditional channels of job boards and headhunters to find and hire new talent. Here are some of the unconventional ways...

The OPM data breach 2 years on: What government agencies must do now

The OPM data breach 2 years on: What government agencies must do now

Recent reports show declining grades for government agencies’ efforts to improve cybersecurity. Experts weigh in on what needs to be done.

Load More