Subscribe to Email Updates


Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Alert Fatigue: Security Teams Stop Chasing Ghosts and Low Impact Events

May 19 by George V. Hulme

As new threats hit enterprise systems and light up enterprise security dashboards, security analysts need to make swift and accurate decisions so that they can respond in the best way possible. Yet, so many alerts come at any given time that the ability for the typical security team to focus on the alerts that matter can seem impossible.

Read More

Digital Transformation Shouldn’t Require a Security Transformation

May 18 by George V. Hulme

It’s often asked, why can’t security innovate more?

Read More

It's Time Security Teams Begin Prep for Quantum Computing

May 17 by George V. Hulme

It seems that every week new news breaks regarding the progress toward reaching practical quantum computing. While this is excellent news for the promised benefits quantum computing will provide, it helps society tackle the biggest problems in computing that traditional computers just can't handle. These include potential breakthroughs in artificial intelligence, the complex modeling involved in nuclear fusion, improved solar cells, cancer, and disease treatments, and financial markets modeling.

Read More

DHS Official: Cybersecurity a "top priority" for Biden Administration

Apr 12 by George V. Hulme
  • S. Secretary of Homeland Security details Federal Cybersecurity Strategy.
  • Initial focus on ransomware, workforce, industrial control security.
  • The federal government needs to take a risk-based, long-term view on cybersecurity.
Read More

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Apr 02 by George V. Hulme
  • Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
  • Such breach disclosure laws have been long found over legal concerns.
  • The EO would also establish that certain software vendors maintain a software bill of materials.
Read More

Malware Delivered Via Cloud Services Rises

Mar 23 by George V. Hulme
  • 53% of Web traffic is now cloud-related, a 20% year over year increase.
  • 61% of all malware is directly delivered via the cloud.
  • Malicious Office documents represented 17% of all malware detected.
Read More

Big Enterprise IoT Device Security Considerations

Mar 22 by George V. Hulme
  • Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 trillion by 2026
  • Unfortunately, these devices often ship with security flaws, poor API management, and lack efficient ways to provide security updates
  • Special Publication 800-213 helps federal agencies understand how IoT devices can impact the network and information security risks within their organizations
Read More

Remote Work and the Long-Term Impact on Risk

Mar 04 by George V. Hulme
  • 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
  • Less than one in five executives say they want to return to the office as it was pre-pandemic.
  • Enterprises are going to have to balance convenience and security over the long haul.
Read More

Toward the post COVID-19 Security Posture

Feb 15 by George V. Hulme
  • As enterprises get comfortable with remote work, their priorities are going to shift.
  • Cybersecurity will be forefront in the year ahead between concerns about cyber espionage and ongoing nation-state attacks, and federal cybersecurity organizational efforts.
  • Remote work has accelerated enterprises are turning zero trust architectures to improve their security.
Read More

Cloud Security Alliance Provides Enhanced IoT Security Guidance

Feb 12 by George V. Hulme
  • As enterprises, and their home workers, deploy IoT devices, the risks these devices pose to enterprise data and systems increases.
  • First released in 2019, the IoT Security Controls Framework established 155 essential security controls that the CSA believed would mitigate many of IoT's risk.
  • The new version of the CSA IoT Security Controls Framework provides clarity on guidance and security enhancements
Read More

The 2020 Year in Cybersecurity Review

Jan 25 by George V. Hulme
  • When it came to healthcare security, 2020 proved to be a continuation of the state of cybersecurity in prior years.
  • While there was considerable concern about some type of digital attacks during the U.S. presidential elections, so far, there's been no credible evidence showing such occurred.
  • One of the more interesting attacks last year was one everyone had the opportunity to watch occur in real-time. And that's the Twitter attack that resulted in the widespread tweeting of a bitcoin scam the summer.
Read More

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Jan 03 by George V. Hulme
  • Not enough organizations are continuously looking for risks in their IT assets.
  • Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
  • Enterprises need to put monitoring regimes in place that can keep pace with technological change.
Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets