Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Security Prediction: Further Browser Vulnerabilities

18 Dec, 2014

According to a Malwarebytes release, 72 percent of IT decision makers said that exploitable browser vulnerabilities are a serious security issue.

...More >

The Insider Risk of Temporary Employees

15 Dec, 2014

Even temporary workers, or maybe especially temporary workers, should be well vetted and have strong security practices in place to protect the network.

...More >

Target Found Negligent in Data Breach Prevention

11 Dec, 2014

The Target breach and a recent court ruling may have a direct impact on several 2015 security predictions.

...More >

Unprecedented or Not: Sony Attack Shows Companies Have Long Way to Go to Improve Security

10 Dec, 2014

While this particular strain of malware might be new here and the FBI is right to warn companies about the risks, not everyone is ready to jump on the 'unprecedented' bandwagon.

...More >

Predictions for 2015: The Future of Cloud Security

08 Dec, 2014

The cloud is changing the entire business computing structure, which will cause it to affect security concerns.

...More >

Sony Pictures Cyberattack: An Inside or Outside Job?

04 Dec, 2014

Speculation is that the Sony attack came from the inside, or at least by those familiar with the internal network, but even that isn’t so cut and dry.

...More >

Companies Struggle to Monitor for Security Threats

01 Dec, 2014

It appears that the ability to monitor for security threats is a real problem no matter how large or small the company is.

...More >

Questions Surround Discovery of Regin Malware

27 Nov, 2014

A lot of questions are swirling about Regin, such as who created it, how long has it been out there, and why did it take so long to be discovered?

...More >

Is Your Security Plan in Order for Black Friday and Cyber Monday?

26 Nov, 2014

You would think that retail outlets would have been stepping up the security game.

...More >

Yet Another Blow to Password Security

24 Nov, 2014

Citadel trojan is now creating serious doubt about the security of passwords and password management systems.

...More >

Staying Ahead of Shadow IT

20 Nov, 2014

Of particular concern is cloud security, where both end users and IT staff are to blame for rule-breaking behavior.

...More >

Lost Devices Cause 68 Percent of Health Care Data Breaches

17 Nov, 2014

The health care industry is the most susceptible to data breaches.

...More >

Recently Discovered Bug Affects All Versions of Windows Since Windows 95

13 Nov, 2014

Microsoft has released a patch for a recently discovered vulnerability that affects every version of Windows since 95.

...More >

Darkhotel Malware Specifically Targets Executives

12 Nov, 2014

Darkhotel is employing techniques that are different from what is usually seen.

...More >

Third-Party Breach of Home Depot Also Highlights Risks of Email Theft

10 Nov, 2014

We tend to hand our email address out too routinely, and we need to rethink that.

...More >

WireLurker Marks New Era in Apple Malware

06 Nov, 2014

Palo Alto Networks has discovered a new malware bug that targets Mac OS X and iOS.

...More >

Rethinking Security Education

03 Nov, 2014

As security threats rise, the lack of skilled security professionals continues at a pretty steady pace.

...More >

Russian BlackEnergy Malware Story Hidden by White House Breach

30 Oct, 2014

Malware that has attacked entities outside the U.S. has been found on networks of  U.S.-based SCADA industrial control system suppliers.

...More >

Threats Increase, but Security Planning Falls Behind

29 Oct, 2014

One of the most disconcerting facts about the state of cybersecurity on the business front came via a Software Advice study.

...More >

Majority of Mobile Malware Attacks Focus on Financial Gains

27 Oct, 2014

Sixty percent of the attacks on Android devices involve financial malware.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Thanks for your registration, follow us on our social networks to keep up-to-date