Profile
Sue Marquette Poremba

Sue Marquette Poremba

Latest content from Sue Marquette Poremba

Why Your Business Must Be Prepared for Security Incidents

27 Mar, 2017

How do you change the mindset of reacting to something that is more proactive and will result in less downtime and fewer man hours to repair the incident?

...More >

Where Is Cybersecurity Headed in 2019?

23 Mar, 2017

Even if we think we know what’s coming, we still aren’t really prepared for it. Our security systems are often built to focus on known attack methods, not for future cybersecurity threats.

...More >

Secret Service Laptop Theft Should Serve as Security Wake-Up Call

20 Mar, 2017

The Secret Service theft is a reminder of how common the disappearance of our devices can be and the risks that are involved.

...More >

Twitter Hack Shows Dangers of Third-Party Access

16 Mar, 2017

Twitter has serious flaws that have led to hacked accounts that were then taken over by bad actors.

...More >

Verizon’s Data Breach Digest Uses Case Studies as Security Response Teaching Tools

14 Mar, 2017

The Verizon Data Breach Digest highlights 16 case studies based on real-world data breach response activities and the lessons learned by the Verizon RISK Team.

...More >

Cybersecurity Pros Don’t Trust Federal Government on Security. Will They Trust States?

13 Mar, 2017

Only 17 percent of security pros believe the government is able to protect itself from cyberattacks. Security professionals are also concerned about the rise in nation-state attacks.

...More >

Cybersecurity Ventures Top 50 Security Companies to Watch

13 Mar, 2017

...More >

CIA Breach Shows Lack of Security in IoT

09 Mar, 2017

We must discuss the ramification to businesses and their employees and customers: the IoT security risks.

...More >

Data Security Lessons from the DNC Hack

07 Mar, 2017

Christy Wyatt, CEO of Dtex, and Robby Mook, former campaign manager for Hillary Clinton, discuss how the DNC hack showed the real-life consequences that come with a data breach.

...More >

Breach Fallout Can Linger Years After the Initial Incident

06 Mar, 2017

News about long-running consequences of Yahoo and Gmail breaches should worry IT security professionals.

...More >

Mismatch in Incentives Gives Cybercriminals an Edge

02 Mar, 2017

One of the reasons cybercriminals have the advantage is because the incentives between the attackers and the defenders are mismatched.

...More >

Cloudbleed Catches Security World Unaware

27 Feb, 2017

We don’t know how long this has been going on, how companies are reacting, or exactly what may be out there. We’ll be hearing about Cloudbleed a lot as we move through 2017.

...More >

7 Top Skills for Security Pros

27 Feb, 2017

Executives at several top tech firms outline the skills they need now and in the near future, including IaaS and IoT security expertise. Other skills listed may surprise you.

...More >

Medical Data Theft Rising Because of Its Value

23 Feb, 2017

The risk is rising, but the medical industry is better recognizing the risk to patient data and is stepping up its cybersecurity efforts.

...More >

The Next Evolution of Ransomware Attacks

22 Feb, 2017

We will see shifts in ransomware, including how attackers will target victims, who they’ll target, and the role IoT will play in ransomware, both as an attack vector and attack target.

...More >

Addressing the Cybersecurity Career Gap

22 Feb, 2017

It seems like those interested in a career in cybersecurity should have no problems finding a job or advancing up the ladder. But problems in education, job listings and realistic expectations abound.

...More >

Your Customers Are Underestimating Security Threats

21 Feb, 2017

As consumers, and in turn as employees, we tend to be pretty haughty about our security IQ.  Nearly two-thirds say they don’t believe they were a victim of a cyberattack, which is highly unlikely.

...More >

Security Professionals Urge Small Businesses to Improve Security Efforts

16 Feb, 2017

Small businesses need to step up their security process before disaster hits.

...More >

Cybersecurity’s Human Side

15 Feb, 2017

One thing is clear so far during RSA. We need to think of cybersecurity in human terms, not just in data or technology.

...More >

Email Threat on the Inside

13 Feb, 2017

We can’t take our eye away from the role insiders play. Email is an essential tool (and for some of us a business lifeline), but it can also be extremely destructive.

...More >
Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.