Subscribe to Email Updates

Subscribe

Author: Ericka Chickowski

An award-winning writer, Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. Chickowski’s perspectives on business and technology have also appeared in dozens of trade and consumer magazines, including Consumers Digest, Entrepreneur, Network Computing and InformationWeek.

All about Virtualization and Cloud Security | Recent Articles:

2018 Sees API Breaches Surge With No Relief in Sight

Dec 04 by Ericka Chickowski

Last year the OWASP Top 10 committee was prophetic in at least one of its inclusions in the update to its industry benchmark list. For the first time, the group included insecure APIs as one of the most common attack vectors that developers need to avoid adding to their code when creating software. Looking back on 2018, you can see why they sounded the warning.

Read More

‘Tis the Season—for a Phishing Frenzy

Dec 03 by Ericka Chickowski

This year’s online holiday shopping season was kicked off to tremendous fanfare, as deal hunters went crazy last week with record-breaking spending. According to USA Today, holiday sales on Cyber Monday topped $7.9 billion in just the US alone. Meanwhile, mega retailer Amazon reported that Cyber Monday was the single biggest global shopping day in its company history—people ordered more than 18 million toys from Amazon on Cyber Monday and Black Friday combined.

Read More

Comparing the OWASP Top 10 to the Real-World Top 10

Nov 14 by Ericka Chickowski

Enterprise software is drowning in vulnerabilities and even organizations highly motivated to fix security flaws in their applications struggle to do it in a timely fashion.

Read More

Cloud Security Rises to Top of 2019 Cybersecurity Budget Priorities

Nov 09 by Ericka Chickowski

As enterprises look toward the 2019 budget cycle, CISOs and other IT executives are increasingly pushing cloud security to the top of the cybersecurity budgetary priority list. 

Read More

2018 State of DevOps: Great for Security

Oct 04 by Ericka Chickowski

The annual State of DevOps report is out for 2018 and the study offered up some very strong proof points for the tight relationship between mature DevOps practices and improved security operations.

Read More

Seven Signs of a Strong Security Culture

Oct 02 by Ericka Chickowski

The importance of a strong enterprise cybersecurity culture to the overall effectiveness of an IT security department can't be understated. It's consistently named by executives as a crucial, if ephemeral, ingredient for cyber risk management success.

Read More

5 DevOps Trends CISOs Must Watch

Sep 04 by Ericka Chickowski

Make no mistake, DevOps trends are catching fire in the enterprise these days and for good reason. A new report out by DevOps Research & Assessment (DORA) shows that the highest performing DevOps organizations are crushing their software delivery metrics.

Read More

Four Cool Tools Expected Out of Black Hat

Aug 03 by Ericka Chickowski

Security professionals, penetration testers and malware investigators are preparing to get energized. In just about a week the hacking community will converge on Las Vegas to drop their biggest discoveries of the year at the podiums of Black Hat USA. This annual confab always offers up a range of great new ideas for defenders, red teamers and security researchers—as well as a boatload of new tools. This year's show should be no different. The buzz is already growing for a number of previously unseen tools that will help security pros solve tough problems and break things in whole new ways. Here are a few highlights.

Read More

5 Cryptojacking Consequences CISOs Can't Ignore

Jul 26 by Ericka Chickowski

The rising tide of criminal schemes to steal compute cycles for mining cryptocurrency has reached a high-water mark. This month researchers report that cryptojacking malware and attacks have overtaken ransomware as the number one malware threat online today.

Read More

Five Reasons Enterprises Aren't Getting the Most Out of Security Automation

Jul 13 by Ericka Chickowski

Automation is enterprise cybersecurity's biggest buzzword as organizations seek to keep pace with a threat landscape that grows more frenetic by the hour. But as automation spending skyrockets, many enterprises are finding that they're not getting the most out of their investment.

Read More

Tesla Sabotage Highlights Danger of Insider Threat

Jun 21 by Ericka Chickowski

Electric car manufacturer Tesla is facing a nightmare insider attack scenario for which too many companies today fail to prepare. Tesla CEO Elon Musk admitted this week that an employee managed to intentionally wreak havoc with the software code that underpins the company's manufacturing system. The fallout has resulted in "quite extensive and damaging sabotage to our operations," according to Musk in a company-wide email that was leaked to CNBC two days ago.

Read More

Three Ways DevOps Teams Can Step Up GitHub Security

Jun 06 by Ericka Chickowski

Last week the team behind Git, a platform that powers millions of the world's developer code repositories--including those on the wildly popular GitHub hosted service--released a crucial security update meant to keep developer environments safe. The patch was made to fix a flaw in how Git handles submodule repository configuration during cloning. It's a dangerous hole that could give attackers the power to create malicious Git repositories and leverage them to run arbitrary code execution on target developer machines.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets