Subscribe to Email Updates

Subscribe

Author: Ericka Chickowski

An award-winning writer, Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. Chickowski’s perspectives on business and technology have also appeared in dozens of trade and consumer magazines, including Consumers Digest, Entrepreneur, Network Computing and InformationWeek.

All about Virtualization and Cloud Security | Recent Articles:

15 Hot Tools To Come Out of Black Hat and Def Con

Aug 07 by Ericka Chickowski

Security summer camp is upon us as the cybersecurity industry convenes on Las Vegas this week for Black Hat and Def Con. In addition to presenting a ton of important research on new vulnerabilities and exploit methods, many security researchers will be sharing with attendees a smorgasbord of new and updated open source tools. Between speaker tracks at both shows, Black Hat Arsenal, and DEF CON Demo Days, presenters will unveil and demo dozens of freebies designed to help their colleagues with a range of offensive and defensive security activities.

Read More

Breach Costs Keep Creeping Upward with Financial Fallout Lasting Years

Jul 26 by Ericka Chickowski

The cost of data breaches keeps increasing for companies, and new research indicates that the financial impact can continue to sap company coffers for years after the incident occurs. Released this week, the 2019 Cost of a Data Breach Report from Ponemon Institute showed that the average data breach now costs companies $3.92 million globally. This represents a 12% rise in breach costs over the last five years.

Read More

Incident Response Lessons Learned from JPL Cybersecurity Fails

Jul 03 by Ericka Chickowski

A few weeks ago, the U.S. federal bureaucrats from the NASA Office of the Inspector General’s audit division put together a thorough document detailing the security woes at NASA Jet Propulsion Laboratory (JPL). The details come together in a classic “what not to do” anti-case study that many security professionals are probably familiar with at this point. It’s a good read for security people interested in learning from the mistakes of others.

Read More

5 Cloud Security Concerns That Still Keep Cybersecurity Pros Up at Night

Jun 26 by Ericka Chickowski

Many cybersecurity leaders today express greater levels of confidence than ever before in their cloud security posture. Cloud security tools have greatly matured over the last few years and that, combined with the inevitability of cloud dominance in modern IT, has helped them reach a wary acceptance of the new normal. Nevertheless, recent research indicates that security pros are still dealing with some significant cloud risk factors that justifiably give them heart palpitations now and again.

Read More

2018 Sees API Breaches Surge With No Relief in Sight

Dec 04 by Ericka Chickowski

Last year the OWASP Top 10 committee was prophetic in at least one of its inclusions in the update to its industry benchmark list. For the first time, the group included insecure APIs as one of the most common attack vectors that developers need to avoid adding to their code when creating software. Looking back on 2018, you can see why they sounded the warning.

Read More

‘Tis the Season—for a Phishing Frenzy

Dec 03 by Ericka Chickowski

This year’s online holiday shopping season was kicked off to tremendous fanfare, as deal hunters went crazy last week with record-breaking spending. According to USA Today, holiday sales on Cyber Monday topped $7.9 billion in just the US alone. Meanwhile, mega retailer Amazon reported that Cyber Monday was the single biggest global shopping day in its company history—people ordered more than 18 million toys from Amazon on Cyber Monday and Black Friday combined.

Read More

Comparing the OWASP Top 10 to the Real-World Top 10

Nov 14 by Ericka Chickowski

Enterprise software is drowning in vulnerabilities and even organizations highly motivated to fix security flaws in their applications struggle to do it in a timely fashion.

Read More

Cloud Security Rises to Top of 2019 Cybersecurity Budget Priorities

Nov 09 by Ericka Chickowski

As enterprises look toward the 2019 budget cycle, CISOs and other IT executives are increasingly pushing cloud security to the top of the cybersecurity budgetary priority list. 

Read More

2018 State of DevOps: Great for Security

Oct 04 by Ericka Chickowski

The annual State of DevOps report is out for 2018 and the study offered up some very strong proof points for the tight relationship between mature DevOps practices and improved security operations.

Read More

Seven Signs of a Strong Security Culture

Oct 02 by Ericka Chickowski

The importance of a strong enterprise cybersecurity culture to the overall effectiveness of an IT security department can't be understated. It's consistently named by executives as a crucial, if ephemeral, ingredient for cyber risk management success.

Read More

5 DevOps Trends CISOs Must Watch

Sep 04 by Ericka Chickowski

Make no mistake, DevOps trends are catching fire in the enterprise these days and for good reason. A new report out by DevOps Research & Assessment (DORA) shows that the highest performing DevOps organizations are crushing their software delivery metrics.

Read More

Four Cool Tools Expected Out of Black Hat

Aug 03 by Ericka Chickowski

Security professionals, penetration testers and malware investigators are preparing to get energized. In just about a week the hacking community will converge on Las Vegas to drop their biggest discoveries of the year at the podiums of Black Hat USA. This annual confab always offers up a range of great new ideas for defenders, red teamers and security researchers—as well as a boatload of new tools. This year's show should be no different. The buzz is already growing for a number of previously unseen tools that will help security pros solve tough problems and break things in whole new ways. Here are a few highlights.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets