Home Sue Poremba Bio
Image of Sue Poremba
Sue Poremba

1

Expertise
Education
Featured In
Highlights
Favorite Technology
Five Top Risks to Mobile Devices and How to Protect Them
I’ve written many times about how the mobile office increases security risks, particularly via the devices that enable us to work from home or coffee shops or hotel rooms. ISACA, a leading global association for enterprise governance of IT, also sees...
Six Questions to Ask Before Joining the Cloud
Data Loss 1 | 2 | 3 | 4 | 5 | 6 You need to ask your cloud service provider what its data-protection policy is and what its audit procedures are. And then you should perform due diligence on those procedures. It’s vital to employ a carefully defined...
Six Questions to Ask Before Joining the Cloud
Co-Location Logistics 1 | 2 | 3 | 4 | 5 | 6 What does the third-party organization do to separate information and systems? Could your competitor, who is also using the service, get its hands on your data? Remember that, in the cloud, you cannot tell whether...
Six Questions to Ask Before Joining the Cloud
Data Corruption and Backups 1 | 2 | 3 | 4 | 5 | 6 How many copies of your data does the third party have? Does it use incremental backups and can it reconstruct an image of your data at a given point in the past from these partial backups? How far back do...
Top 5 Security Concerns for Applications in Cloud Computing
Perform regular source code reviews and vulnerability assessments 1 | 2 | 3 | 4 | 5 | 6 As internal users were trusted, the application had not been exposed to such things like security source code reviews or security vulnerability tests in general....
Top 5 Security Concerns for Applications in Cloud Computing
Implement secure communications channels 1 | 2 | 3 | 4 | 5 | 6 Internally, the application had only trusted users, and all communication was trusted in the sense that all other users were �no security risk.” Challenge: There is a variety of typical...
Top 5 Security Concerns for Applications in Cloud Computing
Develop solid, secure user management 1 | 2 | 3 | 4 | 5 | 6 Internally, the application had only trusted users. Often, internal authentication services, such as LDAP and Microsoft Active Directory, are based on protected internal databases and used for secure...
Trust Running Low on Virtual Security
Which of the following have you implemented for the various layers of the virtual environment? 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 Event tracking in the virtual world is lagging. In the rush to virtualization, security isn’t keeping pace. A survey by...
Trust Running Low on Virtual Security
Rank each of the statements below to the best of your knowledge. 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 Little consensus on most key points. In the rush to virtualization, security isn’t keeping pace. A survey by Prism Microsystems found inadequate budgets...
Trust Running Low on Virtual Security
Which of the following are security concerns for you when it comes to virtualization? (Multiple selections allowed) 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 Hypervisor is the biggest worry. In the rush to virtualization, security isn’t keeping pace. A survey...