Profile
Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

DDoS Attacks on the Rise, but Consumers Remain Unaware

03 Sep, 2015

Though they've been around for a long time, DDoS attacks are still coming on strong and we still struggle to find ways to prevent and deal with them.

...More >

Millennials Turn to Shadow IT When In-House Collaboration Tools Aren’t Satisfactory

31 Aug, 2015

It’s clear there is a serious tech divide, especially in how younger and older workers approach collaboration.

...More >

Why Cloud Security Threats Shouldn’t Inhibit Cloud Adoption

27 Aug, 2015

Yes, cloud security is a big deal. But there are ways to protect your data from the latest threats, so don't say "no" to the cloud because of fear.

...More >

Survey Finds that Almost No One Likes Passwords

26 Aug, 2015

A new survey found that 84 percent of consumers questioned wanted to get rid of passwords altogether. But would they actually use two-factor authentication?

...More >

Behavior Recognition as Cybersecurity Tool

24 Aug, 2015

Teaching behavior recognition has to be an integral part of cybersecurity-professional education and training.

...More >

API Security Needs to Be Backed by CXOs

20 Aug, 2015

Akana released the results of its API security survey, and it found that API security is becoming a C-level concern, but will they follow through?

...More >

Privileged Account Security Still Vulnerable Despite Security Increases

17 Aug, 2015

A survey conducted at Black Hat USA 2015 found that privileged accounts aren’t as secure as we think they are, and that little has been done to improve on security in recent years.

...More >

Why Endpoints May Be the Greatest Risk to Enterprise Security

13 Aug, 2015

A recent survey identified endpoints as a major security risk for enterprises due to human factors and software vulnerabilities, such as Flash.

...More >

Even Security Companies Get Breached

10 Aug, 2015

What does it mean for us if security companies are suffering cyberattacks and data breaches?

...More >

Find the Intersection of Machine Learning and IT Security

10 Aug, 2015

Observing patterns across the entire network to correlate and detect access and data patterns is hard to do manually for a human observer. Collecting and analyzing data using machine learning is far more effective.

...More >

Are Wearable Devices Worth the Workplace Security Risk?

06 Aug, 2015

As one security company proved that malware can move from smartphone to wearable device, it's now time for IT security to take over managing such devices in the workplace.

...More >

Windows 10 Ransomware Scam Represents Growing Trend in Malware

03 Aug, 2015

Scammers have created a new phishing scam by which they send a fake link to download the new Windows 10 OS, in hopes of holding PCs for ransom.

...More >

Have Cyberattacks Become Nation-State Attacks?

30 Jul, 2015

As authorities dig deeper, they find that several recent breaches may all link back to one Chinese cyberespionage group.

...More >

Stagefright Reveals Android’s Biggest Security Flaw

29 Jul, 2015

A new Android vulnerability can be triggered just with your phone number and highlights the slow, difficult task of patching affected Android phones.

...More >

Hackers Gain Control Because Organizations Allow Them to Do So

27 Jul, 2015

The latest AshleyMadison breach shows how hackers have gained control over the Internet because companies are lax about cybersecurity.

...More >

Consumers Want More than Passwords Protecting Data

23 Jul, 2015

New studies show that consumers are starting to become more interested in alternate forms of digital security such as two-factor identification and biometrics.

...More >

Confidence in Information Security Capabilities Is Lacking

21 Jul, 2015

Studies have shown that IT organizations place too much trust in certificates and encryption and believe their security efforts are enough despite continued attacks.

...More >

To Fix Cybersecurity, We Need to Understand It More Completely

16 Jul, 2015

The recent OPM breach and the blame game going on in Washington only goes to prove that our leaders and the public don't seriously understand cybersecurity.

...More >

How to Select the Correct Encryption Approach

14 Jul, 2015

Far from being one-size-fits-all, encryption offers options to fit your organization's various data security needs.

...More >

Hacking Team Hack Reveals Software Exploits

13 Jul, 2015

Unfortunately, this may be the tip of the iceberg.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date