Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Annual Report Shows Increased Maturity in Security Operations

Mar 29 by George V. Hulme

An annual study from enterprise software company Micro Focus has shown progress in the security maturity of organizations, but much more work remains. According to the fifth annual State of Security Operations Report 2018, there has been a 10 percent improvement in organization’s ability to meet security-related business goals. According to the study, about 25 percent of organizations assessed meet those goals.

Read More

Students to Demonstrate Cybersecurity Skills in Annual Hacker Contest

Mar 16 by George V. Hulme

Over the past few years, considerable attention has been given to the cybersecurity skills gap. In the post Enterprises Continue to Grapple with a Huge Cyber Security Skills Shortage we covered how the global cyber security workforce shortage is on pace to hit 1.8 million by 2022, a 20 percent increase since 2015,  according to the Global Information Security Workforce Study. That study found 68 percent of workers in North America think the workforce gap is due to a lack of qualified personnel.

Read More

 Nearly All Cybersecurity Workers on the Job Hunt

Mar 15 by George V. Hulme

Organizations already facing a tough time finding cybersecurity talent may find additional cybersecurity headwinds this year as the vast majority (84 percent) of cybersecurity workers say they are on the lookout for new job opportunities.

Read More

Changes to Data Breach Notifications in the Air

Mar 14 by George V. Hulme

Ever since the first data breach notification law went into effect July 1, 2003 in California (SB 1386), there has been controversy surrounding what types of data being exposed should trigger data breach notifications, who should be notified, and how quickly they should be notified. In fact, it’s become somewhat of a mess.

Read More

The Five Attributes Needed to Succeed at DevSecOps

Feb 27 by George V. Hulme

It’s hard to believe but the conversation around how security fits in DevOps has been going on for years. It was in 2012 when Gartner analyst Neil MacDonald wrote his blog DevOps Needs to Become DevOpsSec. In this blog MacDonald wrote “DevOps seeks to bridge the development and operations divide through the establishment of a culture of trust and shared interest among individuals in these previously siloed organizations. However, this vision is incomplete without the incorporation of information security, which represents yet another silo in IT.”

Read More

Nearly Half of Organizations Cite Employees as Biggest Risk

Feb 22 by George V. Hulme

The more things change, the more they stay the same. While the nature of the technology employees use has dramatically changed over recent decades – from immovable desktops connecting to internal networks to iPads and netbooks with the ability to work anywhere — insiders and employees have remained among the greatest risks. According to the 2018 Netwrix Cloud Security Report, which consists of a survey of 853 various-sized organizations, industries and geographical locations. All organizations are public or hybrid cloud users.

Read More

The Number of Organizations Unprepared for Cyber-Attacks Rose Year Over Year

Feb 19 by George V. Hulme

To anyone who has been paying attention, this isn’t as much of a surprise, as it is a confirmation of the ongoing tenuous condition of enterprise cybersecurity but a just-released survey from specialty insurer Hiscox shows that roughly three-quarters of the 4,100 organizations surveyed face significant shortcomings when it comes to cybersecurity.

Read More

Five Security Books You Should Read if You Haven’t

Feb 14 by George V. Hulme

-

Read More

Cloud use is growing, and your cloud security strategy must grow with it

Feb 07 by George V. Hulme

Is this cloud security Nirvana? 

While many organizations moved to the cloud to try to simplify their IT management, including improve security, they’re learning that it’s not as simple as “shift applications to the cloud and watch the magic happen.”

Read More

US Commerce on Security and Market Incentives — Consumers don’t want security

Jan 22 by George V. Hulme

In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t widely used for multiple reasons, poor product security design and development, counter-productive market incentives, and low education and awareness across all market participants.

Read More

What are your 2018 cybersecurity intentions?

Jan 10 by George V. Hulme

With another year of too many high profile, and quite frankly avoidable, data breaches under our belts, it’s time to take a look forward and identify areas where you may be able to improve your security program and hopefully become more efficient and reduce risk more effectively.

Read More

Six ways security teams sabotage their own plans

Jan 08 by George V. Hulme

It’s not always the bad guys that sabotage enterprise security efforts, sometimes organizations do that all on their own.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets