Profile

Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Community Health Breach Highlights Security Problems in Health Care Industry

20 Aug, 2014

Community Health Systems, a Tennessee-based health care organization, reported that 4.5 million records were compromised this spring.

...More >

Most Companies Admit They Don’t Have a Very Effective Security Response Plan

18 Aug, 2014

Lack of time and lack of budget are top reasons a huge percentage of U.S. company don't have a cybersecurity plan. But the costs of that could be disastrous.

...More >

The Need for a Layered Authentication Approach

14 Aug, 2014

Layered authentication, perhaps with real-time data or a three-factor approach, seems to be a necessity.

...More >

Consumers Believe Privacy Is Responsibility of Website Owners

11 Aug, 2014

Several recent studies show that online privacy worries differ by age and generation. But who is ultimately responsible for privacy?

...More >

With a Breach This Large, Time Is on Your Side

07 Aug, 2014

News of the breach of over a billion personal records should be a nudge to smarter behavior, but there is no need to panic.

...More >

New Malware Hides in Windows Registry

04 Aug, 2014

This new configuration of malware shows that we can’t depend solely on AV software to find and block malware on our computers.

...More >

Department of Homeland Security Takes Further Steps to Strengthen Cybersecurity

31 Jul, 2014

The House of Representatives has passed legislation to strengthen the Department of Homeland Security’s efforts to protect critical infrastructure.

...More >

Data Breaches: On the Rise and Chasing Away Customers

30 Jul, 2014

If customers walk away because your company suffered a breach, would your business be able to survive?

...More >

Nigerian Scams Now Targeting Businesses

28 Jul, 2014

419 scams are making a comeback, but now rely on malware to gain access to business systems.

...More >

Endpoints Are Most Vulnerable Yet Not Well Secured

24 Jul, 2014

Security professionals know what’s coming and they know where the likely risk of a breach is, and yet, they remain (and admit that they are) under-prepared.

...More >

Better Internal Collaboration Can Keep Hackers Away

21 Jul, 2014

The collaboration breakdown often stems from how security is viewed within the company.

...More >

Do You Know Your Company’s Weakest Security Link?

17 Jul, 2014

Insider threats are receiving more attention, but third-party partners and contractors are still woefully ignored.

...More >

Employers, Employees Still Not on Same Page About BYOD

14 Jul, 2014

You’d think after all these years, we’d have done a better job figuring out the security of BYOD.

...More >

Congress Makes New Attempt at Cybersecurity Legislation

10 Jul, 2014

The Cybersecurity Information Sharing Act (CISA) is already being called controversial.

...More >

Shadow IT Is Risky Business

07 Jul, 2014

IT departments might be surprised to find out what their employees are using instead of company-approved apps.

...More >

Russian-Based Dragonfly Group Attacks Energy Industry

03 Jul, 2014

Industrial control systems in the U.S. and Western Europe are being targeted, say security firms.

...More >

Banking Trojans Return to the Spotlight

30 Jun, 2014

Researchers have uncovered a Trojan called Dyre, which was designed to bypass SSL security to steal banking data.

...More >

The Rise of BYOW in the Enterprise

26 Jun, 2014

Smart watches, eyewear like Google Glass, and fitness trackers can all pose a threat to the corporate network.

...More >

Could BYOD Increase Insider Threats?

23 Jun, 2014

A new study predicts an increase in insider threats, but can lax BYOD security be to blame for some of that increase?

...More >

Android and iOS Equally Vulnerable in the Corporate Environment

19 Jun, 2014

The bottom line: It doesn’t really matter which operating system you choose because both are about equal when it comes to threats.

...More >

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making

SOA

SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data