IT Management
Networking
Security
Mobile
Storage
Cloud
Applications
Business Intelligence
Communications
Database
Development
Devices
Servers
Web
Search
Facebook
Linkedin
Twitter
Search
IT Management
Networking
Security
Mobile
Storage
Cloud
Applications
Business Intelligence
Communications
Networking
5G and Industrial Automation: Practical Use Cases
Development
Is 5G Enough to Boost the Metaverse?
Communications
Building a Private 5G Network for Your Business
Development
5G and AI: Ushering in New Tech Innovation
Networking
The Role of 5G in the Sustainability Fight
Database
Development
Devices
Servers
Web
More
Sue Poremba
Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.
Explore
Networking
IoT Devices Vulnerable to Ransomware Attacks
Yesterday, I wrote that Javvad Malik, security advocate at AlienVault, had three reasons for why the Internet of Things...
Networking
IoT’s Growing Pains Put Devices at Risk for Ransomware
Last week, I mentioned a comment from Javvad Malik, security advocate at AlienVault, who said he expects to see...
Security
9 Predictions for Cybersecurity’s Role in Government and Politics...
The 2016 presidential election ushered in new era. As Grant Shirk, senior director of Product Marketing at Vera, pointed...
IT Management
Gmail Phishing Attack Highlights Need for Multi-Factor Authentication
Why do phishing attacks work so well? I don’t think cybercriminals are smarter than the average end user, but...
IT Management
Digital Transformation Has Companies Re-thinking Security Strategies
8 Tips for Ensuring Employee Security Compliance Digital transformation is a hot business and technology buzz word right now,...
Networking
St. Jude Cardiac Device Software Flaws Highlight Risks of...
5 Ways Health Care Can Achieve Stronger Data Security Internet of Things (IoT) security – or lack thereof –...
Security
Adaptive Authentication May Be More Accepted by End Users...
8 Tips for Ensuring Employee Security Compliance End users do not like using two-factor authentication (2FA) options, and that...
Security
Experts Predict Changes in Cybersecurity Insurance Offerings
5 Steps to Protect Executives from a Whale-Phishing Attack While wading through the hundreds of security predictions I received...
Security
Hack of Vermont Electric Utility Laptop Shows Gaps in...
5 Steps for Proactive Cyber Risk Management The holidays are often prime time for cyberattacks. Both companies and consumers...
IT Management
The Need to Combat Security Fatigue
Regular readers of my blog know that I’m a proponent of security education and awareness training. I’m especially so...
Security
Expect an Evolution in Ransomware in 2017
Top 10 Strategic Technology Trends for 2017 Ransomware increased by 10 percent from October to November, according to a...
Networking
Experts: Internet of Things Security Will Affect 2017 in...
When I asked security experts for their 2017 predictions, ransomware was mentioned more often than anything else. But close...