20 Posts

Sue Poremba

    I began writing within the branded content/content marketing space in 2011, including articles, blog posts, SEO, Q&A, and profiles. My specialties are cybersecurity and technology, which I've covered on behalf of a variety of industry verticals (after all, what industry doesn't rely on technology or require security systems?). Throughout the years I've covered security and tech for branded content, I've had a front row seat to security's connection to cloud computing, mobile, big data, IoT and other technologies, and I've become a well-respected reporter in this area. Onalytica recently named me as a top 25 influencer in the cybersecurity space. My relationship with experts and marketing professionals in the security industry provide me with ready access to breaking news and sources for quick-turnaround interviews. In addition to a security blog on IT Business Edge, my work has appeared in Tom's Guide, Forbes, Dark Reading (as a ghostwriter), CIO, CSO, Security Magazine, and USA Today, among other publications. Brands I've worked with and wrote content for include Hewlett Packard Enterprise, IBM, SungardAS, Citizens Bank, Verizon, Microsoft, Kaspersky Lab, TruSTAR, Fortinet, and LogMeIn, to name a few.

    Written By Sue Poremba

    What Security Threats of the Past Can Tell Us About the Future of Cybersecurity

    If we look close enough, many new security threats are something we've seen in another form or an attack style we've had to previously defend against.

    Organizations Continue to Fail at IoT Security, and the Consequences Are Growing

    As the internet of things (IoT) takes over the world, IoT security remains, well, pitiful. Organizations are failing to ensure that the networks and data generated by IoT devices remain protected.

    Developing a Security Plan Around Consumer Data Privacy Concerns

    The onus to meet the challenge of consumers' security and privacy expectations is on the enterprise. Developing a security plan around consumer concerns is a good first step.

    As BYOD Adoption and Mobile Threats Increase, Can Enterprise Data Security Keep Up?

    While most security professionals have come to embrace bring-your-own-device (BYOD) policies, leadership still often lacks confidence in the data security of employees' personal devices.

    Data Privacy Must Evolve Beyond Confidentiality

    Most security systems are built with data confidentiality in mind, but effective data privacy will also emphasize integrity and availability.

    Why the EU Is More Likely to Drive IT and Security Trends Than the US

    EU companies are far ahead of their U.S. counterparts in terms of adopting IT and security trends, according to recent research.

    How to Secure Mobile Messaging in Your Enterprise

    Two decades ago, AOL's Instant Messenger changed the way we communicate. Today, mobile messaging is more popular than ever — but not much more secure.

    As IoT Security Concerns Rise, Are Solutions Keeping Up?

    This year, IoT security jumped in importance for many security professionals as enterprises continue to adopt more IoT technologies. Now, our security tools and solutions need to catch up.

    Your Web Applications Are More Vulnerable Than You Think

    A recent study from Positive Technologies shined a light on an attack vector that is often overlooked: the insecurity of web applications.

    Why Your Organization Should Invest in Cybersecurity Insurance

    Despite the rising cost of a data breach, many organizations still believe they don't need cybersecurity insurance.