Ericka Chickowski

An award-winning writer, Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading. Chickowski’s perspectives on business and technology have also appeared in dozens of trade and consumer magazines, including Consumers Digest, Entrepreneur, Network Computing and InformationWeek.
Find me on:

Recent Posts

Feb 28, 2018

Cybercrime Dominates Business Fraud Losses

Business fraud has been on a dramatic uptick over the last decade and cybercrime stands near ...

The Dirty Dozen Vendors Deluging Your Vulnerability Management Team

We've all heard about the 80/20 rule in business. But in vulnerability management, it may be ...

Feb 01, 2018

Cyber Warranties Could Be Next Big Service Provider Differentiator

As worries about third-party risks continue to press on the minds of technology ...

Jan 31, 2018

Is Your Data Safe from Quantum Supremacy?

Quantum computing may sound like science fiction, but it's coming down the pike faster than ...

Jan 29, 2018

No End in Sight for IoT Botnet Growth

When the Mirai botnet first made waves back in 2016 taking down DynDNS services using an ...

Jan 24, 2018

Leaky Buckets: 10 Worst Amazon S3 Breaches

The last year has proved out about security naysayers' warnings about the undisciplined use ...

Apr 25, 2016

Cloud and SDN Convergence Demand Shift in Network Security

Life in the SOC has grown a lot more complicated in the last few years as the major forces ...

Mar 03, 2016

7 Habits of Highly Successful (And Secure) Rugged DevOps Teams

After several years of peeking through the programming as a very niche topic at RSA ...

Feb 08, 2016

Forget Data Breach Statistics, 2016 Breaches Will Get Personal

Another year came and went and the breach statistics were once again smashed by a raft of ...

Dec 02, 2015

Shadow IT Isn't A Disease--It's A Symptom Of Irrelevance

Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to ...

Aug 25, 2015

3 Federal Trade Commission Cases That Taught Security Lessons The Hard Way

The consumer protection pros at the Federal Trade Commission (FTC) have been on high alert ...

Aug 11, 2015

The 2015 Malvertising Malaise

Revelations by security researchers this week are showing just how prevalent malicious ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW