Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

AI’s biggest risk factor: Data gone wrong

New cryptocurrencies offer better anonymity, new security challenges

New cryptocurrencies offer better anonymity, new security challenges

Anonymous cryptocurrencies like Monero and Zcash help cybercriminals evade detection and make cryptojacking more profitable.

How AI will impact your IT career

How AI will impact your IT career

AI is fast becoming a go-to technology for business transformation, shaking up roles across the enterprise. Here’s how to make the most of this inevitable evolution.

Password managers grow up, target business users

Password managers grow up, target business users

Enterprise-class password managers fill key security gaps left by single sign-on (SSO) and cloud access solutions.

The future of ERP is AI

The future of ERP is AI

Despite cultural barriers and legacy tech, AI is poised to take over ERP functions, with ERP vendors adding new machine learning features and enterprises keen to investigate.

The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

The best antivirus? Kaspersky leads in latest tests, but that's only part of the story

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, antivirus tools still play an important role in the enterprise security strategy.

What is a botnet? And why they aren't going away anytime soon

What is a botnet? And why they aren't going away anytime soon

Controlling thousands or even millions of devices gives cyber attackers the upper hand to deliver malware or conduct a DDoS attack.

What is a supply chain attack? Why you should be wary of third-party providers

What is a supply chain attack? Why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

How hackers crack passwords and why you can't stop them

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before.

How AI can help you stay ahead of cybersecurity threats

How AI can help you stay ahead of cybersecurity threats

Artificial intelligence and machine learning can be force multipliers for under-staffed security teams needing to respond faster and more effectively to cyber threats.

Unlimited DDoS protection the new norm after Cloudflare announcement

Unlimited DDoS protection the new norm after Cloudflare announcement

With Cloudflare ending surge pricing for DDoS protection services, all website owners are protected equally and potential attack damage is limited.

Shadow cloud apps pose unseen risks

Shadow cloud apps pose unseen risks

When individuals and departments bypass IT to acquire cloud services and apps, IT and security teams are blind to the security vulnerabilities and compliance issues they present.

Load More