Maria Korolov

Contributing Writer

Maria Korolov has been covering emerging technology and emerging markets for the past twenty years. She has reported from Russia, India, and Afghanistan, and recently returned to the United States after running a news bureau in China for five years

Cybercrooks fight over DDoS attack resources

Ad network takes steps to reduce fraud

Ad network takes steps to reduce fraud

Online advertisers are losing billions to fraud, but one advertising network has successfully taken steps to clean up its platform. U.S. advertisers spent more $25 billion on programmatic online ads last year, meaning that about $8...

Automated mitigation on endpoint devices and networks can be tricky

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to...

How the insurance industry could change the game for security

How the insurance industry could change the game for security

The recent growth in the cyber insurance market is already improving security in some industry segments, and has the potential to do more -- if the industry is able to address its data problem

Cyberespionage, ransomware big gainers in new Verizon breach report

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most...

Latest OWASP Top 10 looks at APIs, web apps

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs

What it takes to become a data security strategist

What it takes to become a data security strategist

Data security strategist is a fast-growing career, and one that will get even hotter as data from AI and IoT inititiatives pours into enterprises.

What it takes to become a security systems administrator

What it takes to become a security systems administrator

There are many more openings for security systems administrators than qualified applicants. That creates opportunities for IT professionals willing to get the training and certification.

Here's where to buy the Bitcoins to pay a ransom

Here's where to buy the Bitcoins to pay a ransom

Ransomware grew into a $1 billion industry last year, and ransom payments now account for nearly 10 percent of the entire Bitcoin economy. Avoiding becoming part of that statistic requires good endpoint security and effective backups....

After Amazon outage, HealthExpense worries about cloud lock-in

After Amazon outage, HealthExpense worries about cloud lock-in

Financial services companies as popular targets of cybercriminals for the obvious reason -- they're where the money's at. And health care companies have medical records, which are very valuable on the black market since the...

Expert: NY breach report highlights third-party risk

Expert: NY breach report highlights third-party risk

New York reported a record high number of breaches last year, just after a new set of cybersecurity regulations went into effect in the state.

Bitcoin rise fuels social media scams

Bitcoin rise fuels social media scams

The price of a single Bitcoin passed that of an ounce of gold for the first time this month, and scammers were quick to get in on the action with Ponzi schemes and phishing sites spread via social media.

Load More