Articles

  • 1 month ago | reversinglabs.com | Ericka Chickowski

    The more cybersecurity leaders and software builders operationalize software bills of materials (SBOMs) to convey trust and transparency, the more they’re running into the traditional SBOM’s visibility limitations. As valuable as they are, SBOMs — as defined by the software industry — can offer only part of the software supply chain risk picture.

  • 1 month ago | securityboulevard.com | Ericka Chickowski

    The more cybersecurity leaders and software builders operationalize software bills of materials (SBOMs) to convey trust and transparency, the more they’re running into the traditional SBOM’s visibility limitations. As valuable as they are, SBOMs — as defined by the software industry — can offer only part of the software supply chain risk picture.

  • 1 month ago | reversinglabs.com | Ericka Chickowski

    The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 million positions or more. On the other, you’ve got an ever-growing cadre of newly cyber-certified and -degreed candidates who can’t even seem to get a call back for an interview no matter how many resumes they send out. So what gives?

  • 1 month ago | securityboulevard.com | Ericka Chickowski

    The state of the cybersecurity job market can seem like a perplexing paradox. On one hand, you’ve got frothy statistics from the likes of ISC2 stating that cybersecurity workforce shortages total 4.8 million positions or more. On the other, you’ve got an ever-growing cadre of newly cyber-certified and -degreed candidates who can’t even seem to get a call back for an interview no matter how many resumes they send out. So what gives?

  • Mar 6, 2025 | securityboulevard.com | Ericka Chickowski

    One of the biggest problems cybersecurity teams face is the overwhelming uncertainty of situations as cyberattacks unfold. It’s hard to know what mitigations to work on first, which systems are most likely to risk business loss as threat rapidly moves across a network — and how to fix root problems as responders dig into an incident.

Contact details

Socials & Sites

Try JournoFinder For Free

Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.

Start Your 7-Day Free Trial →

X (formerly Twitter)

Followers
3K
Tweets
824
DMs Open
No
Ericka Chickowski
Ericka Chickowski @ErickaChick
17 May 23

RT @Adversa_AI: Europe's Pioneering AI Regulations, AI’s data problem and Strengthening AI Regulation for Safety and Accountability in our…

Ericka Chickowski
Ericka Chickowski @ErickaChick
17 Feb 23

RT @ReversingLabs: @CISAgov is creating a new office to better operationalize cyber supply chain risk management (C-SCRM). @ErickaChick sha…

Ericka Chickowski
Ericka Chickowski @ErickaChick
2 Feb 23

Opsec slip-up tips researchers off to yet another Lazarus Group campaign--this one against healthcare, energy supply chains #cybersecurity #hacking https://t.co/CQvsukhTDs