Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Can Your Company Handle Security Challenges Posed by the Internet of Things?

02 Mar, 2015

It might be time to consider an IoT section to your cybersecurity policy.

...More >

CEOs Talk Better Cybersecurity, but Are Disconnected from Security Efforts In-House

26 Feb, 2015

Corporate leaders publicly agree that cybersecurity is a top priority for business, but recent studies prove that most CEOs don't understand how it works.

...More >

Impersonating IT Staff Becoming a Popular Phishing Tactic

25 Feb, 2015

An email that looks like it is coming from the IT department is a lot harder to ignore, especially if the email covers a legitimate area of concern with the business.

...More >

SMBs Unclear on Data Breach Notification Laws

23 Feb, 2015

Perhaps by putting federal standards in place, SMBs will have an easier time understanding what constitutes a breach and when it needs to be reported.

...More >

Mobile Devices Quickly Becoming the Favored Attack Point

19 Feb, 2015

If there really is such a thing as BYOD fatigue, we’d better get rest fast because there could be a long fight against malware ahead.

...More >

Spyware Embedded in Hard Drives May Have NSA Connection

18 Feb, 2015

Recent stories have surfaced concerning spyware imbedded in hard drives and it may be connected to the NSA.

...More >

Cybersecurity Sharing: The Latest Fad or a Real Security Breakthrough?

16 Feb, 2015

Government agencies and private industry should be working together as a united front to better address the evolving threats facing our networks and data.

...More >

When Email Reveals Too Much

12 Feb, 2015

Lessons learned from Jeb Bush's email fiasco.

...More >

Expect Shadow IT to Be a Long-Term Problem

09 Feb, 2015

A recent study shows that IT departments greatly underestimate how many shadow IT apps are being used within the enterprise.

...More >

Was Anthem Breach a Sophisticated Attack or Just Lax Security Controls?

05 Feb, 2015

Medical data holds little interest for the hackers; the personal information with Social Security numbers holds a lot more value financially.

...More >

Are Insider Threats the Security Professional’s Number-One Concern?

02 Feb, 2015

Thanks in part to the recent Sony hack, insider threats and the dangers they pose are getting a lot more attention than they have in the past.

...More >

The Ongoing Trouble with Passwords

29 Jan, 2015

It's not just the bad passwords, it's the reuse of the same passwords that makes networks vulnerable.

...More >

Make National Data Privacy Day a Priority

28 Jan, 2015

National Data Privacy Day is meant to encourage better privacy and security practices when using our multitudes of devices.

...More >

Year of Mega Breaches Changes Attitudes on Security Spending

26 Jan, 2015

Throwing money at the problem is only one step of the cybersecurity battle.

...More >

Companies Spending More on Cybersecurity but Not Spending Wisely

22 Jan, 2015

Organizations, especially smaller businesses, are doing the wise thing by investing in security systems, but at the same time, they are throwing money away.

...More >

What the Security Experts Think of the SOTU Security Initiatives

21 Jan, 2015

Security experts are pleased that cybersecurity has finally come up for serious discussion, but there is very cautious optimism and a feeling that we still have a long way to go.

...More >

Preparing for New Cybersecurity Battles

19 Jan, 2015

The digital world is a battleground without boundaries.

...More >

Cybersecurity Initiatives to Be Highlighted in the State of the Union Address

15 Jan, 2015

Obama plans to address issues like student privacy through the proposed Student Digital Privacy Act and other protections.

...More >

Consumers Don’t Trust Mobile Payment Options Yet

12 Jan, 2015

It seems that on the consumer side at least, mobile payment adoption has a few hurdles to jump before it becomes mainstream.

...More >

Ransomware Tops List of Social Media Security Threats

08 Jan, 2015

Ransomware is only one of a number of security threats happening via social media--albeit one that has an escalating risk factor.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Thanks for your registration, follow us on our social networks to keep up-to-date