More

    Sue Poremba

    Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

    Explore

    Find the Intersection of Machine Learning and IT Security

    Machine learning is all about algorithms. It’s been used to spot fraud by the financial industry and is supposed...

    Even Security Companies Get Breached

    Post-OPM Breach: Closing Today's Federal Security Gaps We depend on security companies for several things. First and foremost, to...

    Are Wearable Devices Worth the Workplace Security Risk?

    Data Protection: Five Challenges Facing the Enterprise HR Department I know a number of people who wear fitness trackers...

    Windows 10 Ransomware Scam Represents Growing Trend in Malware

    Five Reasons Why Information Security Is Everyone's Job I don’t usually jump on the new software or device bandwagon...

    Have Cyberattacks Become Nation-State Attacks?

    Post-OPM Breach: Closing Today's Federal Security Gaps Is this what cyber war will look like?Reports are saying that several...

    Stagefright Reveals Android’s Biggest Security Flaw

    Five Reasons Why Information Security Is Everyone's Job I am a devoted Android user. I’ve never kidded myself about...

    Hackers Gain Control Because Organizations Allow Them to Do...

    Five Mistakes Managed Security Service Providers Should Avoid The AshleyMadison breach was announced while I was at the airport,...

    Consumers Want More than Passwords Protecting Data

    Five Common Data Encryption Myths Sometimes I think passwords are nothing but trouble for the security world. It seems...

    Confidence in Information Security Capabilities Is Lacking

    Five Common Data Encryption Myths Data breaches and cyberattacks happen daily, across industries and to businesses of all sizes....

    To Fix Cybersecurity, We Need to Understand It More...

    Post-OPM Breach: Closing Today's Federal Security Gaps The Office of Personnel Management (OPM) breach is in the news again....

    How to Select the Correct Encryption Approach

    After Edward Snowden exposed the NSA’s spying and information collection, companies (and individuals) became a lot more interested in...

    Hacking Team Hack Reveals Software Exploits

    How to Navigate the Common Pitfalls of Security Policy Management The recent attack on The Hacking Team ended up...