Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

My Reaction When My Personal Information Was Compromised

28 May, 2015

When Sue Poremba's personal information was compromised in a cyberattack on Penn State's networks, she was left with a lot of questions and few answers.

...More >

IRS the Latest in a Growing List of Repeat Security Breach Victims

27 May, 2015

The IRS revealed this week that hackers used its transcript service to breach the data on 100,000 U.S. taxpayers.

...More >

Like Everything Else, Bots Are Going Mobile

25 May, 2015

Bot developers, like humans, are moving from traditional platforms to mobile, and we should expect to see those numbers grow in the coming year.

...More >

Router Vulnerability Highlights IoT Security Risks

21 May, 2015

SEC Consult has identified a vulnerability in NetUSB, which could allow hackers to exploit routers and other IoT devices on the network.

...More >

SMBs Ignore the Risks of BYOD

20 May, 2015

Perhaps part of the problem is that no one seems sure about who is in charge of security.

...More >

Millennials Have Different Attitude About Security than Older Co-Workers

18 May, 2015

Perhaps the biggest difference between boomers and millennials is how well one generation understands technology and security compared to the other, as well as the general attitudes.

...More >

The VENOM Vulnerability: Is Its Name Scarier Than Its Bite?

14 May, 2015

VENOM is a zero-day vulnerability that breaks down the isolation across virtual machines hosted on QEMU-based hypervisors, but do experts think it's truly dangerous?

...More >

IT Professionals Aren’t Sure Who Controls Data in the Cloud

11 May, 2015

A survey conducted by Perspecsys shows just how far we have to go, especially when it comes to understanding where and how data is protected in the cloud.

...More >

Multiple Studies Show Just How Much Companies Struggle with Security Procedures

07 May, 2015

As business has become increasingly digital, information security has become a key area of operational risk, but many companies still don't take it too seriously.

...More >

Why We Still Struggle with Email Phishing Scams

04 May, 2015

With email, no one is perfect and mistakes are going to happen and scam emails will be opened. But a defense plan needs to be in place for those accidents.

...More >

Poor Consumer Password Hygiene Affects the Workplace

30 Apr, 2015

Employees have bad password habits at home and that can still affect the workplace. But how can we ensure better password management?

...More >

A Conversation About Symantec’s 2015 Internet Security Threat Report

29 Apr, 2015

A Symantec exec breaks down the three main categories of cybersecurity threats.

...More >

Majority of RSA Attendees Approve of Security Information Sharing

27 Apr, 2015

Two companies surveyed participants at the RSA Convention and found that most participants feel that sharing information on threat intelligence will improve security measures. 

...More >

The Password Problem: Nobody Really Wants a Better Solution

23 Apr, 2015

Options like multi-factor authentication and biometrics could replace the regular use of passwords and usernames, but is it really that simple?

...More >

Questioning the Industry’s Slow Response to Improving Security

21 Apr, 2015

Why is it taking so long for industry to embrace security? Perhaps because consumers didn't have much reason to demand it--up until now.

...More >

Point of Sale Malware on the Rise

16 Apr, 2015

Several sources are reporting new POS malware hitting retail businesses, and a Dell study reveals lack of upgrades and maintenance to be one problem behind the attacks.

...More >

White House Hack Shows Security Depends on the Weakest Link

13 Apr, 2015

A rise in cyber espionage proves that anyone involved in IT security should take their job seriously and ensure that such a devastating loss of important information doesn't happen.

...More >

The Heartbleed Anniversary

09 Apr, 2015

Heartbleed might be out of mind, but it isn’t out of our networks.

...More >

First Step After You’ve Been Hacked? Call the Feds

06 Apr, 2015

Most IT security professionals immediately want to solve the mystery after a network breach, but it may be better to leave it up to the FBI.

...More >

Dealing with Cybercriminals: Should It Be the Government or IT Security Pros?

02 Apr, 2015

President Obama recently issued an executive order to address Internet spying and other cyber-based illegal activities.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Thanks for your registration, follow us on our social networks to keep up-to-date