Subscribe to Email Updates

Subscribe

Author: Ericka Chickowski

An award-winning writer, Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. Chickowski’s perspectives on business and technology have also appeared in dozens of trade and consumer magazines, including Consumers Digest, Entrepreneur, Network Computing and InformationWeek.

All about Virtualization and Cloud Security | Recent Articles:

10 Stats About SOC Performance, Practices, and Analyst Attitudes in 2020

Jul 02 by Ericka Chickowski

Recent studies show that the modern SOC has evolved to become the lynchpin for most enterprise security strategies. Organizations spend a significant chunk of their security budget on SOC operations and many depend upon the SOC to help them detect and hunt for threats, respond to incidents, and maintain visibility into the organization's cyber risk posture. However, SOC effectiveness still varies greatly from organization to organization.

Read More

Cloud Security Spending to Buoy the Security Market in 2020

Jun 21 by Ericka Chickowski

Enterprises are putting the brakes temporarily on security spending amid the chaos of the global pandemic, but analysts believe that 2020 will still see growth in the market. A new worldwide security and risk management spending forecast released by Gartner this week updated numbers downward, with the firm projecting infosec spending to grow 2.4% this year compared to the more rosy 8.7% it predicted in December 2019. If the stats hold, the security market will hit $123.8 billion by year end.

Read More

Building Sustainable CISO Succession Paths

Jun 05 by Ericka Chickowski

The CISO role is rapidly evolving as organizations put more responsibility on the plates of their security and risk executives, particularly within large enterprises. In spite of that, a new survey report from security consulting firm Kudelski Security indicates that there is still "no well defined path to becoming a CISO or other senior security leader." The study shows that many organizations are still shooting from the hip when it comes to security succession planning, recruiting security specialists, and grooming senior security leaders with the skills and traits increasingly required by the business to run enterprise-class cybersecurity programs.

Read More

Compliance Costs Are Eating Security Budgets

Jun 02 by Ericka Chickowski

 The cost of cybersecurity compliance is rising to unsupportable levels and enterprises are going to need to act soon if they are to keep the situation from hindering innovation, according to a new report. Conducted jointly by analyst firm Omdia and security advisory consultancy Coalfire, the study shows that over half of firms across all the major verticals are spending 40% or more of their IT security budgets on compliance today.

Read More

7 Hot Takes on Cyber Incident Response Planning

May 12 by Ericka Chickowski

When you fail to plan, you plan to fail. And according to a plurality of veteran security experts, far too many organizations today plan to fail at cyber incident response.

Read More

DDoS Attack Stats Accelerate in Quarantine Era

May 04 by Ericka Chickowski

Even as internet and cloud solution providers are scrambling to reliably handle increased traffic due to the sudden shifts to distributed workforces in the face of COVID-19, they're also battling strains against their bandwidth from a decidedly less legitimate front. According to several pieces of research out recently, DDoS attackers are turning up the heat in the quarantine era.

Read More

Ransomware Crooks Emboldened by More Payments, Experiments in 'Customer' Experience

Apr 10 by Ericka Chickowski

A new report out from CyberEdge Group showed that ransomware attacks broke the record books again last year as criminals were carried to more profitable highs by two new prevailing trends. The first trend is that ransom payers are more successfully recovering their data, which leads to the second trend, namely that more organizations are paying off the ransoms when they're attacked.


Read More

7 Cyberattacks Against Pandemic-Stressed Healthcare Orgs

Apr 07 by Ericka Chickowski

It's only been a couple weeks since our team at Business Insights predicted that healthcare organizations would still be targeted by cybercriminals amid the COVID-19 outbreak. The prognostications are proving sadly accurate. Pandemic or no, healthcare cyberattacks keep coming—in spite of some cybercriminals' promises to the contrary.

Read More

The Protocol That's Putting Enterprise IoT At Extreme Risk

Mar 16 by Ericka Chickowski

A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don't take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide Area Networking (LoRaWAN) protocol is making them susceptible to hacking that could cause civic disruption and even put people at risk.

Read More

Securing AI: The Next Gen of Enterprise Cybersecurity

Mar 05 by Ericka Chickowski

Recently, a facial recognition vendor that consolidates billions of photos to fuel its artificial intelligence (AI) people-searching platform admitted to a major breach. On its surface, the incident is a pretty standard exposure of client list details. But scratch a little deeper and the problems inherent with the breach highlight some of the dangers and cyber risks hiding under the gigantic iceberg that is AI technology today.

Read More

The 'Grass-is-Greener' Syndrome of Modern SOCs

Feb 06 by Ericka Chickowski

While most enterprises recognize the critical role that security operation centers (SOC) play in cybersecurity activities, very few are able to perfect a SOC approach that meets their ultimate satisfaction. A new study out on attitudes toward SOC efficacy shows that organizations are spending millions each year to run their SOCs, but that many are unhappy with the ROI from this investment.

Read More

The Protocol That's Putting Enterprise IoT At Extreme Risk

Feb 04 by Ericka Chickowski

A protocol little known by executives outside of the networking world may put the future safety of enterprise IoT at extreme risk if organizations don't take action to secure their connections. New research out last week found that the way that many large organizations are using the Long Range Wide Area Networking (LoRaWAN) protocol is making them susceptible to hacking that could cause civic disruption and even put people at risk.

Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets