IT Management
Networking
Security
Mobile
Storage
Cloud
Applications
Business Intelligence
Communications
Database
Development
Devices
Servers
Web
Search
Facebook
Linkedin
Twitter
Search
IT Management
Networking
Security
Mobile
Storage
Cloud
Applications
Business Intelligence
Communications
Networking
5G and Industrial Automation: Practical Use Cases
Development
Is 5G Enough to Boost the Metaverse?
Communications
Building a Private 5G Network for Your Business
Development
5G and AI: Ushering in New Tech Innovation
Networking
The Role of 5G in the Sustainability Fight
Database
Development
Devices
Servers
Web
More
Sue Poremba
Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.
Explore
IT Management
Tech Companies Against California Privacy Act
The California Consumer Privacy Act (CCPA) came into being, in part, to keep it off the ballot. There were...
IT Management
Protecting Consumer Data Requires Understanding Consumer Data
If you read my blogs regularly, you might have noticed that GDPR and data privacy have been a frequent...
Security
Upping the Ante on Privacy Protections in the U.S.:...
GDPR has changed the way organizations approach protecting consumers’ personal data. The U.S. is taking some baby steps to...
Security
Customer Data Platforms Are One Solution to Meeting New...
GDPR and the recently passed California Consumer Privacy Act (CCPA) are similar but not the same. So preparation for...
IT Management
California Consumer Privacy Act: Its Similarities and Differences from...
GDPR has been in place for nearly three months. While we’re still in the earliest stages of seeing how...
Networking
Breaches from Third Parties Are the Costliest
Data breaches are expensive. We know that. And they’re going to get more expensive if your company has to...
Security
Majority Say Third Parties Lack Security Visibility
I’ve been reading a book about the Russian infiltration into our election system. One of the early chapters talks...
IT Management
Third-Party Security in a GDPR World
Security risks from third parties are on the rise. A 2017 study from Ponemon Institute found that 56 percent...
Networking
Russians Take Advantage of Third Parties to Hack Utilities
Move over election hacking. The Russians have also infiltrated our electrical utilities control rooms. According to CNET:The hackers --...
IT Management
Working with Third Parties to Decrease Risks: Q&A with...
Target. Delta Airlines. MyFitnessPal. MyHeritage. Applebees. Very different types of businesses, but they do have one thing in common....
Security
Addressing Third-Party Security Risks
It seems like a broken record to say that our traditional cybersecurity systems aren’t good enough to tackle today’s...
Security
As Americans Learn About GDPR, They Want Their Own...
I was at a conference last May, when GDPR was a year away and it was just coming on...