Latest Appearances

InformaTech’s Cybersecurity Bootcamp

InformaTech’s Cybersecurity Bootcamp

Oct 23, 2019
On Oct. 23, 2019, Maria Korolov was a guest speaker at InformaTech’s Cybersecurity Bootcamp, talking about securing the virtual data center.  See her presentation for free and download the slides here.
IDG Tech Talk: CCPA

IDG Tech Talk: CCPA

Sep 6, 2019
On Sep. 6, 2019, Maria Korolov was a guest on IDG Tech Talk to talk about how the California Consumer Privacy Act will affect businesses  Watch the show on YouTube by clicking here.

About Maria Korolov

Maria Korolov is an award-winning tech journalist who covers cybersecurity, artificial intelligence and extended reality.

She’s also a science fiction author and the editor and founder of MetaStellar, an online magazine of speculative fiction, and of Hypergrid Business, one of the world’s top virtual reality blogs.

Contact her at maria@korolov.com to pitch articles or to hire her as writer, editor, or speaker at your event.

Follow her on Twitter at @MariaKorolov, on Threads at @MariaKorolov, and check out her latest videos on the Maria Korolov YouTube channel.

Latest AI articles

AI agents can find and exploit known vulnerabilities, study shows

AI agents can find and exploit known vulnerabilities, study shows

Jul 2, 2024

Researchers at the University of Illinois gave a team of autonomous AI agents a CVE description of a vulnerability and the agents were able to autonomously find and exploit the vulnerability in a test environment in April. Two months later, the same researchers showed that those teams can now find and exploit previously unknown vulnerabilities. They tested the agents by selecting a list of severe vulnerabilities that were discovered after the cut-off training…

10 things to watch out for with open source gen AI

10 things to watch out for with open source gen AI

May 15, 2024
Open source generative AI models can be downloaded for free, used at scale without racking up API call costs, and run securely behind corporate firewalls. But don’t let your guard down. Risks still exist and some aren’t only magnified, but new ones specific to gen AI are emerging.
Data profiling vs. data mining: Why you need both

Data profiling vs. data mining: Why you need both

May 10, 2024
Data mining and data profiling have different roles. Using one without the other is not an option for data management operations that want quality data and usable insights.
Red Hat unveils image mode for its Linux distro

Red Hat unveils image mode for its Linux distro

May 9, 2024
New container image deployment method for Red Hat Enterprise Linux is aimed at helping enterprises streamline operations and management.

Latest quantum computing articles

Cybersecurity in a Post-Quantum World

Cybersecurity in a Post-Quantum World

Jun 7, 2023

Experts agree that future quantum computers will break most current encryption when they become sufficiently powerful. The code to do this – Shor’s algorithm – has already been written. It just needs a powerful enough quantum computer to run on. According to the Cloud Security Alliance (CSA), a suitable quantum computer will be available by 2030. The CSA created a quantum-safe security working group in March 2023 and even has…

dummy-img

What is Quantum Computing and What Does It Have to Do with Encryption?

Oct 21, 2022
Data center cybersecurity managers need to start planning now for when quantum computing breaks current encryption standards.
dummy-img

Managing Encryption for Data Centers Is Hard. And It Will Get Harder

Feb 16, 2021
DATA CENTER KNOWLEDGE–With multi-cloud already here and quantum computing on the horizon, most should probably leave encryption to the experts.
dummy-img

Quantum Teleportation Makes Progress, But Toward What?

Feb 2, 2021
DATA CENTER KNOWLEDGE–What could scientists’ recent success in teleporting quantum states mean for data centers of the future?

Latest Cybersecurity articles

Breach and attack simulation tools: Top vendors, key features, how to choose

Breach and attack simulation tools: Top vendors, key features, how to choose

Jun 4, 2024

Breach and attack simulation (BAS) products help organizations understand their security posture by automating the tests of specific threat vectors. BAS typically uses MITRE ATT&CK and Cyber Killchain frameworks to emulate attacks such as network and infiltration, lateral movement, phishing, endpoint and gateway attacks, malware, and ransomware. The goal of these simulations is to test a company’s defenses against these attack vectors. BAS is complementary to but differs from red teaming and penetration…

Assessing and quantifying AI risk: A challenge for enterprises

Assessing and quantifying AI risk: A challenge for enterprises

Jan 30, 2024
Risks associated with artificial intelligence have grown with the use of GenAI and companies must first understand their risk to create the best protection plan.
dummy-img

3 ways to fix old, unsafe code that lingers from open-source and legacy programs

Nov 29, 2023
Code vulnerability is not only a risk of open-source code, with many legacy systems still in use — whether out of necessity or lack of visibility — the truth is that cybersecurity teams will inevitably need to address the problem.
Data loss prevention vendors tackle gen AI data risks

Data loss prevention vendors tackle gen AI data risks

Oct 31, 2023
Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.

Latest Networking articles

Intel builds world’s largest neuromorphic system

Intel builds world’s largest neuromorphic system

Apr 17, 2024

Quantum computing is billed as a transformative computer architecture that’s capable of tackling difficult optimization problems and making AI faster and more efficient. But quantum computers can’t be scaled yet to the point where they can outperform even classical computers, and a full ecosystem of platforms, programming languages and applications is even farther away. Meanwhile, another new technology is poised to make a much more immediate difference: neuromorphic computing. Neuromorphic…

dummy-img

VMware combines SASE and edge management in new orchestration platform, announces private 5G service

Aug 22, 2023
News from the VMware Explore conference includes a unified management platform for VMware’s SASE and edge computing stack, along with a new managed private mobile networking service.
VMware, Nvidia team on enterprise-grade AI platform

VMware, Nvidia team on enterprise-grade AI platform

Aug 22, 2023
VMware Private AI Foundation with Nvidia will enable enterprises to customize models and run generative AI applications on their own infrastructure in their data centers, at the edge, and in their clouds.
dummy-img

Hybrid mesh firewall platforms gain interest as management challenges intensify

Aug 15, 2023
Different types of firewalls, including hardware, virtual, cloud-native, and firewall as a service, can be deployed and managed from a central interface with a hybrid mesh firewall platform.
dummy-img

Flight to cloud drives IaaS networking adoption

Aug 1, 2023
Demand for cloud connects/interconnects is rising as enterprises commit to multicloud and SaaS application environments, and that’s driving greater interest in IaaS cloud networking services, says IDC.
dummy-img

Gartner: SSE landscape shifts as vendors add more security services

Jul 12, 2023
Vendors are stacking their security service edge (SSE) suites with even more security functions, according to the latest Gartner Magic Quadrant.

latest Awards

latest Appearances

older Awards and Appearances

Judge, 2019 CSO50 awards

Maria is one of the judges of the annual CSO50 awards, which recognize 50 organizations for their security project or initiative that demonstrates outstanding business value and thought leadership.

Judge, Epica Awards

Maria is a member of the jury of the 2018 Epica awards, the only global creative prize judged by journalists.

Jan. 2018: Maria Korolov talks with Sine Wave about “Succeeding As A Retailer In Immersive Worlds.” 

Dec. 2017: Speaker at Stereopsia conference in Brussels, Belgium. Topic was women in virtual reality. Click here for slides.

Dec. 2017: Speaker at OpenSimulator Community Conference. Topic was a statistical overview of OpenSim development. Click here for slides.

Apr. 2017: Profiled in Viar360’s Women of VR – 35 Ladies Who Are Killing It In Virtual Reality

Aug. 2016: Mentioned in Marie Claire’s Virtual Reality Has a Female Mafia—and They’re Looking for New Recruits

BBC Image

May 2016: Interviewed by the BCC about how virtual reality will change our lives. Listen to the broadcast hereRead the transcript here.

Sep. 2015: Mentioned in Fortune’s Meet the women shaping our virtual future.

Latest Blog Posts

Do I quote vendors in articles?

Jun 4, 2020
dummy-img

(Image courtesy Geralt via Pixabay.) This question has been coming up a lot lately, and there’s a whole speech I give…

Online Filemaker alternatives: Coda, Zoho, AppSheet, AppGyver, and more

Apr 1, 2020
Online Filemaker alternatives: Coda, Zoho, AppSheet, AppGyver, and more

UPDATE FEB. 2021: Lately, I’ve been testing out a new online collaboration tool called Notion. The basic plan, which includes sharing with up to five…

My writing groups meet on Zoom

Mar 25, 2020
dummy-img

New update, June 18: I’ve started a new virtual Zoom-based MeetUp group for speculative fiction writers. If you write science fiction, fantasy or horror, check…

Otter.AI just announced a great free deal on its transcription

Mar 25, 2020
dummy-img

(Image courtesy Otter.AI.) Another tool useful for writers that I’ve talked about this one in writers’ meetings before is Otter.AI. It…

The tech journalist starter kit

Oct 23, 2019
The tech journalist starter kit

Filming IDG Tech Talk in September of 2019. A friend of a friend just called me, asking for advice on how…

The Lost King of Krim hits multiple Amazon category bestseller lists

Sep 6, 2019
The Lost King of Krim hits multiple Amazon category bestseller lists

The Lost King of Krim was #10 on Amazon’s Two-Hour Science Fiction & Fantasy Short Reads best seller list on September…