Articles by Sue Poremba 

How to Recover from a Failed Security Audit

In November, the Department of the Interior failed a security audit, whi

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Seven Security Features That Make Windows 7 Worth a Look

With its newest OS, Microsoft makes some real gains in operating system security. This slideshow walks you through some of the key new features.

Unlimited Vulnerabilities in the Smart Grid

The smart grid has been on my mind a lot lately – possibly because I've been seeing articles about it everywhere the past month, particularly regarding the Obama administration's support for it.

Cloud Computing Security Conundrum

Proof that a technology is gaining in popularity – it becomes a target for the bad guys. And so it goes for cloud computing.

Security Risks in Social Networks Not Going Away Any Time Soon

Love it or hate it, one thing is certain: Social networking has become part of the business environment.  Even if

Passwords, Policy and Protection

Recently, I wrote about the importance of securing portable devices like laptops and external hard drives, in which encryption can play a large role in protecting data if the device is lost or stolen.

Get the Latest Scoop with Enterprise Networking Planet Newsletter