Sue Poremba Sue Poremba is freelance writer based in central Pennsylvania. She's been writing about cybersecurity and technology trends since 2008.
Sue Poremba
Personal App Use on the Rise – And So Are Cloud Security Risks
Shadow IT and BYOD are not new problems, but the pandemic highlighted just how much workers rely on cloud applications to increase their productivity. The use of personal apps on the corporate network has become more accepted now than even just a few years ago. But what this has created ... Read More
Security Boulevard
Why Manufacturing Struggles With Cloud Security
Attacks targeting cloud infrastructure are on the rise, according to the Netwrix 2022 Cloud Data Security Report, and the industry that is most vulnerable to attacks on the cloud is manufacturing. Slightly more than half of manufacturing companies experienced an attack on their cloud infrastructure in the past year. What ... Read More
Security Boulevard
Organizations Lack Visibility Into Cloud Access
Do you know who is accessing your data in the cloud? According to a study conducted by Laminar, one in three respondents didn’t know if a third-party actor was able to successfully compromise their data in the public cloud. Nor did respondents have much insight into the behavior of insiders, ... Read More
Security Boulevard
Implement Cloud Security Tools Now, Not Later
Sue Poremba | | Cloud Data Protection, Cloud Security, cloud security alliance, CSA, layered defense
Two-thirds of organizations use the cloud to hold sensitive data or workloads, but there is a lingering lack of confidence about the ability to protect that information, according to research from the Cloud Security Alliance. And while more than a quarter of these organizations are using confidential computing to protect ... Read More
Security Boulevard
OpenAPIs and Third-Party Risks
With APIs, details and specifics are vital. Each API usually takes in very specific requests in a very specific format and returns very specific information, Sammy Migues, principal scientist at Synopsys Software Integrity Group explained. You make the request and you get the information. APIs can be constructed in different ... Read More
Security Boulevard
Identity’s Role in API Security
Digital identities play an important role in an organization’s security program. But the idea of “identity” in APIs can be complex, Jeff Williams, CTO and co-founder at Contrast Security, said in an email interview. “People think of APIs as a way for two software applications to communicate,” Williams explained. For ... Read More
Security Boulevard
Your DevOps Process Needs to Integrate API Security
If your organization relies on the cloud, you also rely on APIs. “Whatever the project of the day (application modernization, monolith to microservice digital transformation, multi-cloud service mesh enablement, to name a few), APIs have become the backbone of modern application architectures and the digital supply chains organizations rely on,” ... Read More
Security Boulevard
API Security Requires Everyone’s Support
If you leave cybersecurity responsibilities only to the security team, your organization is setting itself up for a major cybersecurity incident. Security teams are already battling conditions that leave them ripe for burnout. But when non-security staff isn’t held responsible for keeping up with even the most minor security steps, ... Read More
Security Boulevard
Identities, Risk and the Multi-Cloud Environment
Sue Poremba | | Cloud Security, iam, identity and access management, identity orchestration, multi-cloud
The multi-cloud environment is having its moment. More organizations are moving applications into the cloud, and a multi-cloud environment offers better redundancy and availability, as well as pushes forward digital transformation. However, identity management presents a challenge to organizations adopting multi-clouds, according to research by Strata Identity. Seven in ten ... Read More
Security Boulevard
Employees That Circumvent Access Introduce Risk
We are not a patient society, and we are made less patient as technology continues to evolve. Productive business operations thrive on faster internet connections, faster computers, faster applications and so on. What isn’t fast is cybersecurity. The steps and solutions required to ensure users, networks and data remain safe ... Read More
Security Boulevard