Reporters.io
Carrie Pallardy
InformationWeek
Profile
Contacts
Recent Articles on Subject
1
Carrie Pallardy
InformationWeek
Freelance Writer and Editor.
Chicago
writing
editing
Letting Neurodiverse Talent Shine in Cybersecurity
- 11 days ago
Iranian Threat Actors Ramp Up Ransomware, Cyber Activity
- 12 days ago
Internet Archive Cyberattack Saga Continues
- 24 days ago
Big Breach Sends National Public Data to Bankruptcy
- about 1 month ago
CIOs Lessons From Disney’s Post-Breach Decision To Leave Slack
- about 2 months ago
How to Rein in Cybersecurity Tool Sprawl
- about 2 months ago
US Puts Big Bounty Bullseye on Russian Hackers
- 2 months ago
How AI Impacts Sustainability Opportunities and Risks
- 2 months ago
Could California's AI Bill Be a Blueprint for Future AI Regulation?
- 2 months ago
Will Data Centers in Orbit Launch a New Phase of Sustainability?
- 3 months ago
Examining the National Public Data Breach and Risks for Data Brokers
- 3 months ago
What Can We Expect from Election Hack Escalations?
- 3 months ago
Outages Aftermath: What's Next for Microsoft and Its Customers?
- 3 months ago
What Does the US-Russia Prisoner Swap Mean for Ongoing Cybercrime?
- 3 months ago
What Can Be Learned from KnowBe4’s North Korean IT Hire?
- 4 months ago
How Much Data Is Too Much for Organizations to Derive Value?
- 4 months ago
Sensitive Data of Millions Stolen in MSpy Breach
- 4 months ago
Anatomy of an Effective Tabletop Exercise
- 4 months ago
OpenAI's 2023 Breach Raises Questions About AI Industry Transparency
- 4 months ago
CDK Global Cyberattacks: What Can CIOs Learn About Single Points of Failure?
- 5 months ago
Delving Into the Risks and Rewards of the Open-Source Ecosystem
- 5 months ago
Could Antitrust Probes Lead to AI Market Upheaval?
- 5 months ago
What Is the Future of AI-Driven Employee Monitoring?
- 5 months ago
How Cybersecurity and Sustainability Intersect
- 5 months ago
6 Months Under the SEC’s Cybersecurity Disclosure Rules
- 6 months ago
How Does the Ransomware-as-a-Service Model Work?
- 6 months ago
Tracking Pixels and Another Big Health Care Breach
- 7 months ago
What the American Privacy Rights Act Could Mean for Data Privacy
- 7 months ago
Cyber Risks When Job Hunters Become the Hunted
- 7 months ago
‘XZ Utils’ Open-Source Software Threat Prompts Concern
- 8 months ago
Why Cultural Institutions Are Rich Targets for Cyberattackers
- 8 months ago
Pulling the Curtain Back on China’s Cyber Espionage
- 8 months ago
10 Ways to Boost Cybersecurity Talent Retention
- 8 months ago
McDonald’s Global Outage: Configurations and Third-Party Risk
- 8 months ago
Recent Ivanti Vulnerabilities: 4 Lessons Security Leaders Can Learn
- 8 months ago
How to Evaluate a CISO Job Offer
- 8 months ago
Can Anyone Be a Realistic Competitor for OpenAI?
- 8 months ago
How to Budget for Generative AI in 2024 and 2025
- 8 months ago
How Ransomware Fallout Is Rippling Through the US Health Care System
- 9 months ago
ConnectWise ScreenConnect Vulnerabilities: What CIOs Need to Know
- 9 months ago
International Operation Hits Major Ransomware Player LockBit
- 9 months ago
2023 Ransomware Payments Hit $1.1B Record
- 9 months ago
How to Get Your Failing Data Governance Initiatives Back on Track
- 9 months ago
China's Volt Typhoon Found Lurking in Critical Infrastructure for Years
- 9 months ago
Expect the Unexpected: How to Reduce Zero-Day Risk
- 9 months ago
8 Priorities for Cloud Security in 2024
- 10 months ago
Microsoft ID’s Russia-Backed Actor Behind Leadership Email Hacks
- 10 months ago
MFA and Misinformation: What to Know About SEC’s X Account Hack
- 10 months ago
What Will It Take to Adopt Secure by Design Principles?
- 10 months ago
Merck's Cyberattack Settlement: What Does it Mean for Cyber Insurance Coverage?
- 10 months ago