Ericka Chickowski
Recent Posts
Cybercrime Dominates Business Fraud Losses
Business fraud has been on a dramatic uptick over the last decade and cybercrime stands near ...
The Dirty Dozen Vendors Deluging Your Vulnerability Management Team
We've all heard about the 80/20 rule in business. But in vulnerability management, it may be ...
Cyber Warranties Could Be Next Big Service Provider Differentiator
As worries about third-party risks continue to press on the minds of technology ...
Is Your Data Safe from Quantum Supremacy?
Quantum computing may sound like science fiction, but it's coming down the pike faster than ...
No End in Sight for IoT Botnet Growth
When the Mirai botnet first made waves back in 2016 taking down DynDNS services using an ...
Leaky Buckets: 10 Worst Amazon S3 Breaches
The last year has proved out about security naysayers' warnings about the undisciplined use ...
Cloud and SDN Convergence Demand Shift in Network Security
Life in the SOC has grown a lot more complicated in the last few years as the major forces ...
7 Habits of Highly Successful (And Secure) Rugged DevOps Teams
After several years of peeking through the programming as a very niche topic at RSA ...
Forget Data Breach Statistics, 2016 Breaches Will Get Personal
Another year came and went and the breach statistics were once again smashed by a raft of ...
Shadow IT Isn't A Disease--It's A Symptom Of Irrelevance
Shadow IT. Just the name runs little shivers up the spines of IT executives—they like to ...
3 Federal Trade Commission Cases That Taught Security Lessons The Hard Way
The consumer protection pros at the Federal Trade Commission (FTC) have been on high alert ...
The 2015 Malvertising Malaise
Revelations by security researchers this week are showing just how prevalent malicious ...