Media Database
>
Ericka Chickowski

Ericka Chickowski

Contributing Writer at Dark Reading

Contact this person
Email address
e*****@*******.comGet email address
Influence score
46
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Languages
  • English
Covering topics
  • Business
  • Computers & Technology

View more media outlets and journalists by signing up to Prowly

View latest data and reach out all from one place
Sign up for free

Recent Articles

darkreading.com

Power Users to Protective Stewards: Tuning Security Training for Specialized Employees

The best security training programs build strong security culture by focusing on high-risk groups, including developers, executives, and finance pros.
darkreading.com

The Best End User Security Awareness Programs Aren't About Awarenes...

The goal is to apply psychology principles to security training to change behaviors and security outcomes.
darkreading.com

Anyone Using Agentic AI Needs to Understand Toxic Flows

The biggest vulnerabilities may lie at the boundaries of where the AI agent connects with the enterprise system.
darkreading.com

Do Claude Code Security Reviews Pass the Vibe Check?

AI-assisted security reviews from Anthropic and others could help level up enterprise application security in the era of vibe coding.
darkreading.com

FBI's Most Wanted Cybercriminals

The Federal Bureau of Investigation has got millions of dollars worth of rewards waiting for those who can help them nab these accused cyber thieves, spies and fraudsters.
darkreading.com

What Cybersecurity Pros Really Think About Artificial Intelligence ...

While there’s a ton of unbounded optimism from vendor marketing and consultant types, practitioners are still reserving a lot of judgment.
darkreading.com

6 Facts About How INTERPOL Fights Cybercrime

So you think you know INTERPOL? Here are some key details of how this international law enforcement entity disrupts cybercrime worldwide.
darkreading.com

Patch Now: Another Google Zero-Day Under Exploit in the Wild - Dark...

Google has rolled an emergency patch for CVE-2024-4947, the third Chrome zero-day it’s addressed in the past week.
darkreading.com

Top 5 Most Dangerous Cyber Threats in 2024

SANS Institute experts weigh in on the top threat vectors faced by enterprises and the public at large.
darkreading.com

CISO as a CTO: When and Why It Makes Sense

Enterprises are increasingly recognizing that the CISO's skills and experience building risk-based cyber programs translate well to other C-suite positions.
darkreading.com

5 Hard Truths About the State of Cloud Security 2024

Dark Reading talks cloud security with John Kindervag, the godfather of zero trust.
darkreading.com

10 Tips for Better Security Data Management

CISOs must build out their security data management and security data architecture to get the most out of their security data for the least amount of investment.
darkreading.com

10 Security Metrics Categories CISOs Should Present to the Board

Boards of directors don’t care about the minute technical details of the security program. They want to see how key performance indicators are tracked and utilized.
darkreading.com

Forget Deepfakes or Phishing: Prompt Injection is GenAI's Biggest P...

With prompt injection, AI puts new spin on an old security problem
darkreading.com

7 Loyalty Program and Rewards App Attacks

The number of attacks targeting loyalty and rewards programs is growing. Here are some of the lowlights.
darkreading.com

Passing the Sniff Test: Security Metrics and Measures

Cigital dishes dirt on top security metrics that don’t work well, why they’re ineffective and which measurable to consider instead.
darkreading.com

NFL Mobile Sports App Contains Super Bowl-Sized Vulns - Dark Reading

Lack of protections puts users at risk of exposed information by way of man-in-the-middle attacks.
darkreading.com

TXOne: How to Improve Your Operational Technology Security ... - Da...

In this Dark Reading News Desk segment, Terence Liu of TXOne Networks discusses operational technology and industrial cybersecurity.
darkreading.com

Top 15 Indicators Of Compromise

Unusual account behaviors, strange network patterns, unexplained configuration changes, and odd files on systems can all point to a potential breach
darkreading.com

Flow Security Launches GenAI DLP - Flow Security Launches GenAI ......

Flow Security Launches GenAI DLP - Flow Security Launches GenAI ... - Dark Reading
darkreading.com

10 Holiday Gifts for Stressed-Out Security Pros - 10 Holiday Gifts ...

Office giving-friendly fidgets, stress balls, brain teasers, and more that are perfect to calm the most harried cybersecurity professionals.