Reporters.io
Carrie Pallardy
InformationWeek
Profile
Contacts
Recent Articles on Subject
1
Carrie Pallardy
InformationWeek
Freelance Writer and Editor.
Chicago
writing
editing
What Does Biden's New Executive Order Mean for Cybersecurity?
- 5 days ago
How CISOs Can Build a Disaster Recovery Skillset
- 7 days ago
Addressing the Security Risks of AI in the Cloud
- 9 days ago
The Biggest Cybersecurity Issues Heading into 2025
- 16 days ago
New Cybersecurity Rules Coming for Health Care
- 19 days ago
What Do We Know About the New Ransomware Gang Termite?
- about 1 month ago
Does Cyber Insurance Drive Up Ransom Demands?
- about 2 months ago
Clearing the Clouds Around the Shared Responsibility Model
- about 2 months ago
Threat Actors Put $1 Trillion Shopping Season in Their Sights
- about 2 months ago
Does the US Government Have a Cybersecurity Monoculture Problem?
- 2 months ago
AI and the War Against Plastic Waste
- 2 months ago
What Could the Trump Administration Mean for Cybersecurity?
- 2 months ago
Letting Neurodiverse Talent Shine in Cybersecurity
- 3 months ago
Iranian Threat Actors Ramp Up Ransomware, Cyber Activity
- 3 months ago
Internet Archive Cyberattack Saga Continues
- 3 months ago
Big Breach Sends National Public Data to Bankruptcy
- 3 months ago
CIOs Lessons From Disney’s Post-Breach Decision To Leave Slack
- 4 months ago
How to Rein in Cybersecurity Tool Sprawl
- 4 months ago
US Puts Big Bounty Bullseye on Russian Hackers
- 4 months ago
How AI Impacts Sustainability Opportunities and Risks
- 4 months ago
Could California's AI Bill Be a Blueprint for Future AI Regulation?
- 5 months ago
Will Data Centers in Orbit Launch a New Phase of Sustainability?
- 5 months ago
Examining the National Public Data Breach and Risks for Data Brokers
- 5 months ago
What Can We Expect from Election Hack Escalations?
- 5 months ago
Outages Aftermath: What's Next for Microsoft and Its Customers?
- 5 months ago
What Does the US-Russia Prisoner Swap Mean for Ongoing Cybercrime?
- 6 months ago
What Can Be Learned from KnowBe4’s North Korean IT Hire?
- 6 months ago
How Much Data Is Too Much for Organizations to Derive Value?
- 6 months ago
Sensitive Data of Millions Stolen in MSpy Breach
- 6 months ago
Anatomy of an Effective Tabletop Exercise
- 6 months ago
OpenAI's 2023 Breach Raises Questions About AI Industry Transparency
- 6 months ago
CDK Global Cyberattacks: What Can CIOs Learn About Single Points of Failure?
- 7 months ago
Delving Into the Risks and Rewards of the Open-Source Ecosystem
- 7 months ago
Could Antitrust Probes Lead to AI Market Upheaval?
- 7 months ago
What Is the Future of AI-Driven Employee Monitoring?
- 8 months ago
How Cybersecurity and Sustainability Intersect
- 8 months ago
6 Months Under the SEC’s Cybersecurity Disclosure Rules
- 8 months ago
How Does the Ransomware-as-a-Service Model Work?
- 8 months ago
Tracking Pixels and Another Big Health Care Breach
- 9 months ago
What the American Privacy Rights Act Could Mean for Data Privacy
- 10 months ago
Cyber Risks When Job Hunters Become the Hunted
- 10 months ago
‘XZ Utils’ Open-Source Software Threat Prompts Concern
- 10 months ago
Why Cultural Institutions Are Rich Targets for Cyberattackers
- 10 months ago
Pulling the Curtain Back on China’s Cyber Espionage
- 10 months ago
10 Ways to Boost Cybersecurity Talent Retention
- 10 months ago
McDonald’s Global Outage: Configurations and Third-Party Risk
- 10 months ago
Recent Ivanti Vulnerabilities: 4 Lessons Security Leaders Can Learn
- 10 months ago
How to Evaluate a CISO Job Offer
- 10 months ago
Can Anyone Be a Realistic Competitor for OpenAI?
- 10 months ago
How to Budget for Generative AI in 2024 and 2025
- 11 months ago