Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

Best antivirus software: 14 top tools

Why even the best antivirus software isn't enough (and why you still need it)

Why even the best antivirus software isn't enough (and why you still need it)

Antivirus software can’t keep up with new malware or variants of known malware, but it still plays a role in an overall endpoint protection strategy.

What is enterprise risk management? How to put cybersecurity threats into a business context

What is enterprise risk management? How to put cybersecurity threats into a business context

Cybersecurity risks are now a key part of the ERM process. Here’s how infosec professionals should talk about cybersecurity risk and assess its impact.

7 best practices for working with cybersecurity startups

7 best practices for working with cybersecurity startups

Security startups are often ahead of the technology curve and can provide more personalized service. Here's how to find the best of them and minimize risks.

What is a botnet? And why they aren't going away anytime soon

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

What are next generation firewalls? How the cloud and complexity affect them

What are next generation firewalls? How the cloud and complexity affect them

Nextgen firewalls add features like behavioral analytics, malware detection, and content monitoring to prevent unauthorized access and data exfiltration. They could do much more in the future.

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California Consumer Privacy Act (CCPA): What you need to know to be compliant

California's new privacy law, AB 375, might not burden security as much as the GDPR, but details are subject to change.

Why securing containers and microservices is a challenge

Why securing containers and microservices is a challenge

Their granularity, deployment speed, and data traffic volume require new approaches to securing container environments.

AI in the supply chain: Logistics gets smart

AI in the supply chain: Logistics gets smart

Interest in machine learning and AI for SCM is increasing as companies envision a more predictable, automated future for logistics and distribution.

New AI tools make BI smarter — and more useful

New AI tools make BI smarter — and more useful

Data science democratized: What used to take data scientists months to prepare may soon be put together in a few days by data-astute business users.

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

Verizon report: Ransomware top malware threat of 2017, moving into critical systems

DDoS attacks are also on the rise, but spying reports are down. Fewer people are clicking on phishing links.

What is a supply chain attack? Why you should be wary of third-party providers

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

Load More