Profile
Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Windows 10 Ransomware Scam Represents Growing Trend in Malware

03 Aug, 2015

Scammers have created a new phishing scam by which they send a fake link to download the new Windows 10 OS, in hopes of holding PCs for ransom.

...More >

Have Cyberattacks Become Nation-State Attacks?

30 Jul, 2015

As authorities dig deeper, they find that several recent breaches may all link back to one Chinese cyberespionage group.

...More >

Stagefright Reveals Android’s Biggest Security Flaw

29 Jul, 2015

A new Android vulnerability can be triggered just with your phone number and highlights the slow, difficult task of patching affected Android phones.

...More >

Hackers Gain Control Because Organizations Allow Them to Do So

27 Jul, 2015

The latest AshleyMadison breach shows how hackers have gained control over the Internet because companies are lax about cybersecurity.

...More >

Consumers Want More than Passwords Protecting Data

23 Jul, 2015

New studies show that consumers are starting to become more interested in alternate forms of digital security such as two-factor identification and biometrics.

...More >

Confidence in Information Security Capabilities Is Lacking

21 Jul, 2015

Studies have shown that IT organizations place too much trust in certificates and encryption and believe their security efforts are enough despite continued attacks.

...More >

To Fix Cybersecurity, We Need to Understand It More Completely

16 Jul, 2015

The recent OPM breach and the blame game going on in Washington only goes to prove that our leaders and the public don't seriously understand cybersecurity.

...More >

How to Select the Correct Encryption Approach

14 Jul, 2015

Far from being one-size-fits-all, encryption offers options to fit your organization's various data security needs.

...More >

Hacking Team Hack Reveals Software Exploits

13 Jul, 2015

Unfortunately, this may be the tip of the iceberg.

...More >

A Hacking Story Even Better Than a Hollywood Movie

09 Jul, 2015

With hacktivism, lazy password systems, nations paying a lot of money to be able to cyber-spy, and hints that this could spill over to private enterprise, even Hollywood can’t make up stuff like this.

...More >

Trump Hotels Data Breach: More of the Same

06 Jul, 2015

These types of security situations are repeating themselves, with just small individualistic quirks.

...More >

New Android Malware Found Every 18 Seconds

02 Jul, 2015

New research statistics show that the Android platform is receiving the bulk of attacks on mobile OSes. Is your enterprise safe from such BYOD threats?

...More >

Is Your Website Failing to Keep Customers’ Data Secure and Private?

29 Jun, 2015

OTA analyzed approximately 1,000 websites in three categories: consumer protection, privacy and security.

...More >

Two-Factor Authentication: Better Than Passwords But Still Not Foolproof

25 Jun, 2015

Already, criminals have developed a spear phishing attack that bypasses two-factor authentication methods on mobile devices to gain access to email accounts.

...More >

Government Fails Miserably at Cybersecurity

24 Jun, 2015

Every industry is failing miserably at cybersecurity, but no industry is as bad at cybersecurity as our government.

...More >

LastPass Breached Again. Is This a Trend?

22 Jun, 2015

LastPass has been breached. Again. For at least the third time now since 2011. At what point is something an anomaly and at what point is it a trend?

...More >

Cardinals and Astros Strike Out on Security Practices

18 Jun, 2015

Ten months of Astros’ internal trade talks were leaked online last year, which sparked the investigation.

...More >

Cybercriminals Are Getting Rich from Our Security Failures

15 Jun, 2015

The 2015 Trustwave Global Security Report puts some big numbers on the profitability of ransomware and exploit kits for hackers.

...More >

Cloud Apps Failing at Security of Sensitive Data

11 Jun, 2015

Two studies point to cloud apps as a particular pain point for security breaches, and health care data as a big target for theft.

...More >

Alternatives to Passwords: What’s on the Horizon?

09 Jun, 2015

Let's be realistic. We're screwed with all these passwords. Experts discuss what really has to be done, and whether we're willing to do it.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 
Thanks for your registration, follow us on our social networks to keep up-to-date