More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    Are We Wasting Too Much Money on Cybersecurity?

    5 Types of DDoS Attacks to Defend Against in 2016 In his final budget proposal, President Obama is asking...

    Mobile Devices Responsible for Increasing Number of Network Breaches

    6 Cyber Secrets Setting You Up for Betrayal We talk a lot about the monetary losses of a network...

    Cybersecurity Approaches Fail to Evolve, Even When Attacks Grow...

    5 Security Challenges Facing State and Local Governments in 2016 Hewlett Packard Enterprise (HPE) recently released its annual cybersecurity...

    Security Experts Differ on Apple versus FBI

    5 Security Challenges Facing State and Local Governments in 2016 By now I’m sure you’ve heard about the FBI’s...

    The Many Ways Passwords Put Data at Risk

    The Human Factor: 5 Security Blunders People Keep Making Just in time for tax season comes word of all...

    The Economics of Cybercrime, from the Criminal’s Perspective

    Health Care Data Breaches: 5 Tips for Protecting Sensitive Information Often when we talk about cybercrime and cybercriminals, we...

    When It Comes to Cloud Security, It’s All About...

    The Human Factor: 5 Security Blunders People Keep Making Recently, I wrote about cloud security and research by the...

    DDoS Attacks Surging

    A New Security Approach to Combat Today's Threats HSBC UK’s online banking system was hit with a DDoS attack...

    Why It Seems Like Cybersecurity Is a Losing Battle

    The Human Factor: 5 Security Blunders People Keep Making If it seems like businesses are fighting a losing battle...

    Data Privacy Day a Good Chance to Review How...

    Security 2016: What to Expect in the New Year Today is National Data Privacy Day. I swear, we have...

    Banking and Health Care Struggle with App Security

    Health Care Data Breaches: 5 Tips for Protecting Sensitive Information App hardening isn’t a new concept. However, if you...

    Cisco Report Shows Why Good Security Is Tough

    2016 Security Trends: What's Next for Data Breaches? I’ve been writing about IT security for nearly a decade. I’ve...