Profile
Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Make National Data Privacy Day a Priority

28 Jan, 2015

National Data Privacy Day is meant to encourage better privacy and security practices when using our multitudes of devices.

...More >

Year of Mega Breaches Changes Attitudes on Security Spending

26 Jan, 2015

Throwing money at the problem is only one step of the cybersecurity battle.

...More >

Companies Spending More on Cybersecurity but Not Spending Wisely

22 Jan, 2015

Organizations, especially smaller businesses, are doing the wise thing by investing in security systems, but at the same time, they are throwing money away.

...More >

What the Security Experts Think of the SOTU Security Initiatives

21 Jan, 2015

Security experts are pleased that cybersecurity has finally come up for serious discussion, but there is very cautious optimism and a feeling that we still have a long way to go.

...More >

Preparing for New Cybersecurity Battles

19 Jan, 2015

The digital world is a battleground without boundaries.

...More >

Cybersecurity Initiatives to Be Highlighted in the State of the Union Address

15 Jan, 2015

Obama plans to address issues like student privacy through the proposed Student Digital Privacy Act and other protections.

...More >

Consumers Don’t Trust Mobile Payment Options Yet

12 Jan, 2015

It seems that on the consumer side at least, mobile payment adoption has a few hurdles to jump before it becomes mainstream.

...More >

Ransomware Tops List of Social Media Security Threats

08 Jan, 2015

Ransomware is only one of a number of security threats happening via social media--albeit one that has an escalating risk factor.

...More >

Make Security Evaluation a New Year’s Routine

05 Jan, 2015

Take a fresh start each new year by evaluating your security plans and budgets and educating users with new devices.

...More >

Security Prediction: Expect More Complex Social Engineering

29 Dec, 2014

Social engineering is all about exploiting the most vulnerable of vulnerabilities: human behavior.

...More >

Security Prediction: The Rise of the Third-Party Risk

25 Dec, 2014

As we move closer to 2015, retailers would be wise to work more closely with their vendors and consultants and ensure that everyone is on the same page when it comes to security practices.

...More >

Security Prediction: Improved Cybersecurity Legislation

22 Dec, 2014

Legislative bodies both on a state and federal level need to recognize that citizens and businesses need more universal breach reporting regulations.

...More >

Security Prediction: Further Browser Vulnerabilities

18 Dec, 2014

According to a Malwarebytes release, 72 percent of IT decision makers said that exploitable browser vulnerabilities are a serious security issue.

...More >

The Insider Risk of Temporary Employees

15 Dec, 2014

Even temporary workers, or maybe especially temporary workers, should be well vetted and have strong security practices in place to protect the network.

...More >

Target Found Negligent in Data Breach Prevention

11 Dec, 2014

The Target breach and a recent court ruling may have a direct impact on several 2015 security predictions.

...More >

Unprecedented or Not: Sony Attack Shows Companies Have Long Way to Go to Improve Security

10 Dec, 2014

While this particular strain of malware might be new here and the FBI is right to warn companies about the risks, not everyone is ready to jump on the 'unprecedented' bandwagon.

...More >

Predictions for 2015: The Future of Cloud Security

08 Dec, 2014

The cloud is changing the entire business computing structure, which will cause it to affect security concerns.

...More >

Sony Pictures Cyberattack: An Inside or Outside Job?

04 Dec, 2014

Speculation is that the Sony attack came from the inside, or at least by those familiar with the internal network, but even that isn’t so cut and dry.

...More >

Companies Struggle to Monitor for Security Threats

01 Dec, 2014

It appears that the ability to monitor for security threats is a real problem no matter how large or small the company is.

...More >

Questions Surround Discovery of Regin Malware

27 Nov, 2014

A lot of questions are swirling about Regin, such as who created it, how long has it been out there, and why did it take so long to be discovered?

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Thanks for your registration, follow us on our social networks to keep up-to-date