More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    Firewalls Remain a Vital Part of a Good Security...

    Security Threats: 5 Common Network Blind Spots In the not too distant past, security tools focused on anti-virus/anti-malware software...

    Health Care Facilities Targeted in a Wave of Ransomware...

    5 Security Steps to Protect Users from Ransomware Most of us are familiar with ransomware, at least in theory,...

    Verizon Breach Shows How No One Is Immune from...

    Study Pinpoints IT Security's Top Data Security Concerns Everyone is susceptible to a data breach, even the companies that...

    Studies Find Cybersecurity Continues to Lag in Federal Agencies

    Security Threats: 5 Common Network Blind Spots Outdated systems, budget constraints and old habits are three big reasons why...

    The Future Threat Horizon: IoT and Regulations Could Be...

    6 Cyber Secrets Setting You Up for Betrayal Predicting the future of cybersecurity is a big deal in the...

    Security a Low Priority for Many C-Level Executives

    The Human Factor: 5 Security Blunders People Keep Making When it comes to security and reports like those I’ve...

    How Communities Are Using Smart Building and Smart City...

    According to Frost and Sullivan, eight elements make a city “smart”: smart buildings, smart energy, smart mobility, smart health...

    The Difficulty of Finding a Good Security Posture

    6 Cyber Secrets Setting You Up for Betrayal Cybersecurity is finally getting the attention it requires, but based on...

    A Conversation About Cybersecurity with Lee Rossey, Co-Founder and...

    I spend a lot of time talking to cybersecurity experts. Usually, those conversations are based around a specific incident...

    Ransomware Targeting Mac OS Found in the Wild

    8 Important People to Connect with During a Major IT Incident Can we finally put to rest the myth...

    Studies Show Rise of the Mobile Malware Threat

    BYOD for the CIO: Maximize Productivity While Maintaining Security If you aren’t convinced that your company needs to step...

    Nissan LEAF Vulnerability Shows Cars Share Similar Issues with...

    What Does 2016 Hold for the Evolving Security Landscape? Your IT and/or security department has to provide security for...