Kelly Jackson Higgins, DarkReading

Kelly Jackson Higgins

DarkReading

Virginia, United States

Contact Kelly

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • DarkReading
  • InformationWeek

Past articles by Kelly:

Meet the Computer Scientist Who Helped Push for Paper Ballots

Security Pro File: Award-winning computer scientist and electronic voting expert Barbara Simons chats up her pioneering days in computer programming, paper-ballot backups, Internet voting, math, and sushi. → Read More

TA505 Targets HR Departments with Poisoned CVs

Infamous cybercrime organization spotted in attacks that employ legitimate software -- and Google Drive. → Read More

Data Leak Week: Billions of Sensitive Files Exposed Online

A total of 2.7 billion email addresses, 1 billion email account passwords, and nearly 800,000 applications for copies of birth certificate were found on unsecured cloud buckets. → Read More

How Diversity Can Bridge The Talent Gap

Women and minorities in the security industry share some hard truths about the security industry's hiring traditions and practices. → Read More

Russian Cyberspies' Leaked Hacks Could Herald New Normal

Time to set cyber espionage 'norms' before more volatile nation-states follow suit, experts say. → Read More

Poorly Configured DNSSEC = Potential DDoS Weapon

New research from Neustar shows how attackers could abuse DNSSEC-secured domains for distributed denial-of-service (DDoS) attacks. → Read More

New HIPAA Guidance Tackles Ransomware Epidemic In Healthcare

HHS addresses ransomware infections in wake of healthcare attacks. → Read More

How To Use Threat Intelligence Intelligently

Sometimes it's about a beer, but it's mainly about being prepared before opening the threat intel floodgates. → Read More

New Internet Of Things Security-Certification Program Launched

ICSA Labs now offers a security testing program for IoT products, following the recently announced 'CyberUL' security certification program. → Read More

Why Microsoft's New Office 2016 Macro Control Feature Matters

Resurgence in macro attacks result in Microsoft adding new protections from macro abuse. → Read More

Epic Security #FAILS Of The Past 10 Years

In honor of Dark Reading's 10-year anniversary, a look at ten of the biggest failed security trends, technologies, and tactics. → Read More

Conficker Showdown: No End In Sight

Reinfected machines likely part of the 5.5 to 6 million-strong Conficker headcount → Read More

Domain Abuse Sinks 'Anchors Of Trust'

Georgia Tech researchers create algorithm to help detect rising DNS domain abuse by cybercriminals, nation-state actors. → Read More

That Time I Got Publicly 'Hacked'

In honor of Dark Reading's 10th anniversary, I embarrass myself one more time for posterity. → Read More

Dark Reading Radio: How To Get The Most Out Of Your Security Budget

Join us on Wednesday, May 18 at 1pmEDT/10am PDT, for a discussion with security executives on how to prioritize and manage your IT security budget. → Read More

CSRF Vulnerability: A 'Sleeping Giant'

A mostly unknown Web vulnerability called Cross-Site Request Forgery could be the next attack vector on your Website → Read More

Verizon DBIR Puzzler Solved With Meghan Trainor And 'Cyber Pathogens'

All about that puzzler's paradise that is the 2016 Annual Verizon Data Breach Investigations Report cover contest. → Read More

Healthcare Suffers Estimated $6.2 Billion In Data Breaches

Nearly 90 percent of healthcare organizations were slammed by a breach in the past two years. → Read More

What's Next For Network Security

A 'vanishing' physical network perimeter in the age of mobile, cloud services, and the Internet of Things, is changing network security as well. → Read More

4 Signs That Apple's Sharpening Its Security Game

Apple is quietly making some subtle, incremental security moves in the face of new threats to its products → Read More