Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Russian BlackEnergy Malware Story Hidden by White House Breach

30 Oct, 2014

Malware that has attacked entities outside the U.S. has been found on networks of  US-based SCADA industrial control system suppliers.

...More >

Threats Increase, but Security Planning Falls Behind

29 Oct, 2014

One of the most disconcerting facts about the state of cybersecurity on the business front came via a Software Advice study.

...More >

Majority of Mobile Malware Attacks Focus on Financial Gains

27 Oct, 2014

Sixty percent of the attacks on Android devices involve financial malware.

...More >

Twitter Rethinks Authentication and Access

23 Oct, 2014

Twitter announces the use of Digits, an authentication company, to change the way users log in to the microblogging site.

...More >

Cloud Adoption on the Rise, While Cloud Security Attitudes Remain Mixed

20 Oct, 2014

One common thread is that business leaders want to adopt cloud computing, and they are going to move forward, whether or not good security plans are in place.

...More >

SSL Encryption Bitten by POODLE

16 Oct, 2014

The vulnerability needs to be taken very seriously, but is really a good reminder of the importance of always using smart security practices.

...More >

Dairy Queen Admits Breach Weeks After Speculation

13 Oct, 2014

As point of sale breaches are happening almost weekly at this point, what are system providers doing to alleviate the risks?

...More >

Cybersecurity Awareness Month Reminds Us to Practice Better Security Habits

09 Oct, 2014

Sponsored by the Department of Homeland Security, this is the 10th anniversary of Cybersecurity Awareness Month, and we’ve never needed it more.

...More >

Consumers Are Growing Tired of Data Breaches

06 Oct, 2014

Recent surveys show that consumers are fed up with lax security and are weary from the ongoing saga of security breaches.

...More >

FDA Takes Steps to Improve Medical Device Security

02 Oct, 2014

The FDA has finally released recommendations for medical device manufacturers on providing security to mitigate risk of hacking.

...More >

Why We Should Recognize Usernames as a Security Risk

29 Sep, 2014

It is time to focus as much on the risk of usernames as we do passwords. Are your employees using the same usernames for business and personal use?

...More >

Bash Vulnerability Could Affect Security of Internet of Things

25 Sep, 2014

Bash or Shellshock affects Linux, Unix and Mac OS X. Some say it will be worse than Heartbleed.

...More >

You Should Never Ignore IT Security Warnings

22 Sep, 2014

The attacks on businesses are getting more creative, which means that companies need to be more vigilant about security than ever before.

...More >

The Rise of Retail Breaches

18 Sep, 2014

You have to be living under a rock to not notice that retail breaches are happening with alarming frequency.

...More >

Android Browser Bug Puts Privacy at Risk

17 Sep, 2014

The old Android AOSP browser contains a bug that can be exploited, so users with Jelly Bean-based devices should be aware.

...More >

Saks Incident Highlights Real Risks of Insider Threats

15 Sep, 2014

The Saks insider breach is a wakeup call that we have to worry just as much about the inside as we do about watching for attacks from the outside.

...More >

Hiding Malware in Short-Life Websites

11 Sep, 2014

A whopping 71 percent of Web host names, approximately 470 million out of 660 million unique names, are only meant to last for 24 hours. This is by design.

...More >

The Many Layers of the iCloud Hack

08 Sep, 2014

Experts across the security industry say multiple failures in strategy led to this breach, and Apple isn't doing enough.

...More >

Why Businesses Should Pay Attention to the Home Depot Breach

04 Sep, 2014

If you run a business where credit and debit cards are used as a form of payment, you should care about the Home Depot breach for several reasons.

...More >

Questions Surround Presumed Dairy Queen Data Breach

01 Sep, 2014

Rumblings of a Dairy Queen data breach reveal the tricky relationship among franchises, parent companies and network security.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Thanks for your registration, follow us on our social networks to keep up-to-date