Ericka Chickowski

7 Hot Takes on Cyber Incident Response Planning

When you fail to plan, you plan to fail. And according to a plurality of veteran security experts, far too…

7 months ago

DDoS Attack Stats Accelerate in Quarantine Era

Even as internet and cloud solution providers are scrambling to reliably handle increased traffic due to the sudden shifts to…

8 months ago

Ransomware Crooks Emboldened by More Payments, Experiments in ‘Customer’ Experience

A new report out from CyberEdge Group showed that ransomware attacks broke the record books again last year as criminals…

9 months ago

7 Cyberattacks Against Pandemic-Stressed Healthcare Orgs

It's only been a couple weeks since our team at Business Insights predicted that healthcare organizations would still be targeted…

9 months ago

The Protocol That’s Putting Enterprise IoT At Extreme Risk

A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at…

9 months ago

Securing AI: The Next Gen of Enterprise Cybersecurity

Recently, a facial recognition vendor that consolidates billions of photos to fuel its artificial intelligence (AI) people-searching platform admitted to…

10 months ago

The ‘Grass-is-Greener’ Syndrome of Modern SOCs

While most enterprises recognize the critical role that security operation centers (SOC) play in cybersecurity activities, very few are able…

11 months ago

The Protocol That’s Putting Enterprise IoT At Extreme Risk

A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at…

11 months ago

API Security a Top Concern for Cybersecurity in 2020

The role of the application programmable interface (API) keeps rising in prominence within the enterprise. And as that happens, so…

12 months ago

The Year Ahead for Kubernetes and Container Security

A new study out conducted among the DevSecOps community shows that Kubernetes use is rapidly growing within the enterprise, and…

12 months ago