
Ericka Chickowski
Technology Journalist and Business Writer at Freelance
Tech journalist and freelance business writer. Covering where biz meets tech: cybersecurity, DevOps & digital transformation.
Articles
-
1 week ago |
reversinglabs.com | Ericka Chickowski
The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 million positions or more. On the other, you’ve got an ever-growing cadre of newly cyber-certified and -degreed candidates who can’t even seem to get a call back for an interview no matter how many resumes they send out. So what gives?
-
1 week ago |
securityboulevard.com | Ericka Chickowski
The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 million positions or more. On the other, you’ve got an ever-growing cadre of newly cyber-certified and -degreed candidates who can’t even seem to get a call back for an interview no matter how many resumes they send out. So what gives?
-
1 month ago |
securityboulevard.com | Ericka Chickowski
One of the biggest problems cybersecurity teams face is the overwhelming uncertainty of situations as cyberattacks unfold. It’s hard to know what mitigations to work on first, which systems are most likely to risk business loss as threat rapidly moves across a network — and how to fix root problems as responders dig into an incident.
-
1 month ago |
securityboulevard.com | Ericka Chickowski
As technology leadership pushes ever harder to deeply embed AI agents into software development lifecycles — in some cases, even using agentic AI to replace midlevel developers — application security (AppSec) is about to go from complex to a lot more complicated.
-
2 months ago |
reversinglabs.com | Ericka Chickowski
The U.S. Cybersecurity Infrastructure Security Agency (CISA) recently released new guidance on its Secure by Design principles, outlining best practices that the IT sector should take to reduce the cyber-risks its products are exposing its customers to. Insecure code is being released by software firms, cloud providers, hardware manufacturers, and others, amplifying risk across the entire digital economy.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 3K
- Tweets
- 824
- DMs Open
- No

RT @Adversa_AI: Europe's Pioneering AI Regulations, AI’s data problem and Strengthening AI Regulation for Safety and Accountability in our…

RT @ReversingLabs: @CISAgov is creating a new office to better operationalize cyber supply chain risk management (C-SCRM). @ErickaChick sha…

Opsec slip-up tips researchers off to yet another Lazarus Group campaign--this one against healthcare, energy supply chains #cybersecurity #hacking https://t.co/CQvsukhTDs