More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    New Challenges Arise for Banking Security

    A New Security Approach to Combat Today's Threats It’s been a while since we’ve talked about banking security, but...

    10 Ways Wearables Put Your Network in Serious Danger

    Wearable devices aren’t quite as ubiquitous as smartphones – at least not yet. IDC predicts that the wearables market...

    Breaches Up but Compromised Records Down

    A New Security Approach to Combat Today's Threats The number of data breaches in the first half of 2015...

    Don’t Hang Out in These Shady Web Neighborhoods

    A New Security Approach to Combat Today's Threats When I got an email asking if I was interested in...

    DDoS Attacks on the Rise, but Consumers Remain Unaware

    A New Security Approach to Combat Today's Threats DDoS attacks have been a headache for IT and security professionals...

    Millennials Turn to Shadow IT When In-House Collaboration Tools...

    Data Loss Prevention: 5 Reasons You Need to Step Up Your Game Shadow IT is happening in your company,...

    Why Cloud Security Threats Shouldn’t Inhibit Cloud Adoption

    Top Data Leak Vulnerabilities and How to Secure Them I got an email the other day that said companies...

    Survey Finds that Almost No One Likes Passwords

    Top Data Leak Vulnerabilities and How to Secure Them Is there anyone out there anymore who thinks passwords are...

    Behavior Recognition as Cybersecurity Tool

    Five Reasons Why Information Security Is Everyone's Job If you think about it, many of the security incidents that...

    API Security Needs to Be Backed by CXOs

    5 Ways HTTP Protocol Can Address Emerging Cloud Threats I don’t think I’m off base saying this, but in...

    Privileged Account Security Still Vulnerable Despite Security Increases

    5 Components of an Enterprise Print Security Strategy In theory, creating privileged access accounts to the most critical areas...

    Why Endpoints May Be the Greatest Risk to Enterprise...

    Data Loss Prevention: 5 Reasons You Need to Step Up Your Game Have you thought about where your data...