Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

The Password Problem: Nobody Really Wants a Better Solution

23 Apr, 2015

Options like multi-factor authentication and biometrics could replace the regular use of passwords and usernames, but is it really that simple?

...More >

Questioning the Industry’s Slow Response to Improving Security

21 Apr, 2015

Why is it taking so long for industry to embrace security? Perhaps because consumers didn't have much reason to demand it--up until now.

...More >

Point of Sale Malware on the Rise

16 Apr, 2015

Several sources are reporting new POS malware hitting retail businesses, and a Dell study reveals lack of upgrades and maintenance to be one problem behind the attacks.

...More >

White House Hack Shows Security Depends on the Weakest Link

13 Apr, 2015

A rise in cyber espionage proves that anyone involved in IT security should take their job seriously and ensure that such a devastating loss of important information doesn't happen.

...More >

The Heartbleed Anniversary

09 Apr, 2015

Heartbleed might be out of mind, but it isn’t out of our networks.

...More >

First Step After You’ve Been Hacked? Call the Feds

06 Apr, 2015

Most IT security professionals immediately want to solve the mystery after a network breach, but it may be better to leave it up to the FBI.

...More >

Dealing with Cybercriminals: Should It Be the Government or IT Security Pros?

02 Apr, 2015

President Obama recently issued an executive order to address Internet spying and other cyber-based illegal activities.

...More >

Hotel Wi-Fi Vulnerability a Reminder About Security Risks on the Road

30 Mar, 2015

No one should assume that the Wi-Fi they are using is secure, including (perhaps especially) in hotels.

...More >

Is It Time for Federal and State Leaders to Improve Cybersecurity Efforts?

26 Mar, 2015

When we see the increase in breaches and vulnerabilities and the growing concern of Internet espionage, I don’t see how anyone in a leadership role can ignore cybersecurity.

...More >

Mobile App Development Often Ignores Security Measures

23 Mar, 2015

Corporations have the chance to increase the security of the apps they are developing and to show that they respect the data of their customers, clients and employees.

...More >

Report Finds Companies Remain Lax with PCI Compliance

19 Mar, 2015

Becoming PCI compliant is important, but real cybersecurity comes when the company sustains the controls well beyond the assessment period.

...More >

Health Care Industry Returns as a Prime Data Breach Target

18 Mar, 2015

The health care industry is lax when it comes to security.

...More >

March Madness Provides Plethora of Opportunities for Online Predators

16 Mar, 2015

IT staff worries that networks will be at a greater risk because of all the March Madness online activities – much of them done without permission or against company rules.

...More >

Stress Levels on the Rise for Security Professionals

12 Mar, 2015

Trustwave's study gives a clearer picture of the heavy IT security expectations being put on data security professionals today.

...More >

Almost No One Is Immune from the FREAK Attack

09 Mar, 2015

The first reports of FREAK Attack, which like Heartbleed involves open source code, were via initial warnings through Mac and Android-native browsers.

...More >

A Serious Look at Third-Party Security

05 Mar, 2015

In so many of the high-profile breaches we’ve seen over the past 18 months, a third-party security breakdown has been, at least partially, to blame.

...More >

Can Your Company Handle Security Challenges Posed by the Internet of Things?

02 Mar, 2015

It might be time to consider an IoT section to your cybersecurity policy.

...More >

CEOs Talk Better Cybersecurity, but Are Disconnected from Security Efforts In-House

26 Feb, 2015

Corporate leaders publicly agree that cybersecurity is a top priority for business, but recent studies prove that most CEOs don't understand how it works.

...More >

Impersonating IT Staff Becoming a Popular Phishing Tactic

25 Feb, 2015

An email that looks like it is coming from the IT department is a lot harder to ignore, especially if the email covers a legitimate area of concern with the business.

...More >

SMBs Unclear on Data Breach Notification Laws

23 Feb, 2015

Perhaps by putting federal standards in place, SMBs will have an easier time understanding what constitutes a breach and when it needs to be reported.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Thanks for your registration, follow us on our social networks to keep up-to-date