Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Advanced Attack Groups Increasingly Threaten North American Electric Utilities

Feb 14 by George V. Hulme

When it comes to critical infrastructure, there are few more essential than electricity generation and distribution. Without electricity, nothing else works. According to a report from cybersecurity firm Dragos, groups have shown that they have the capability to impact power operations and network connectivity detrimentally. "Electric utilities remain at risk for a disruptive – and potentially destructive – cyberattack due to the political and economic impact such an event may cause,” the firm wrote in its report North American Electric Cyber Threat Perspective.

Read More

Majority of Developers are Concerned over the state of Their Application Security

Feb 11 by George V. Hulme

While software developers are showing signs of high apprehension when it comes to the security of their software, their organizations however have considerable work ahead of them getting developers the tools they need to succeed.

Read More

Six Signs You have a Great Cybersecurity Culture

Jan 29 by George V. Hulme

What is security culture? There’s lots of talk about how important security culture is to a security program, but security culture is a nebulous concept to attempt to define — and harder still to measure. It’s also, apparently, difficult to achieve: a survey from the IT governance professional’s organization ISACA found that nine in ten enterprises said they have a gap between the security culture they want to have and the actual culture they have in place.

Read More

U.S. Healthcare Data Breach Cost $4 Billion in 2019. 2020 Won't Be Any Better

Jan 13 by George V. Hulme

New research estimates, after all the breach data, is tallied, that by the end of 2019, healthcare-related data breaches will cost the industry $4 billion, and respondents to a recent survey expect those numbers to only increase in the year ahead.

Read More

Pair of Data Breaches Top Off the Year in Healthcare Security

Jan 03 by George V. Hulme

Canada-based LifeLabs notified 15 million patients on December 17 that their personal information relating to healthcare, including name, address, email, login, passwords, date of birth, healthcare number, and lab test results, may have been accessed without authorization. Most of those affected reside within British Columbia and Ontario.

Read More

Data security, privacy are big hurdles in front of successful digital transformation

Dec 26 by George V. Hulme

Healthcare organizations are doing everything they can to modernize and digitally transform their organizations, but by many accounts, healthcare remains a laggard when it comes to digitization. And as a recent PwC report reads, “The question for 2020 will be whether this digital transformation will benefit consumers—marking a new dawn for the US health industry and for the people whose lives depend on it.”

Read More

Healthcare Security: How To Deploy IoT Securely

Dec 20 by George V. Hulme

The healthcare internet of things (IoT) market is expected to reach 543 billion by 2025 — at an annual growth rate of roughly 20%, according to a report from Grand View Research. Research firm Gartner pegs healthcare IoT growth in 2020 at 29%.

Read More

Seven Toxic Information Security Personalities

Dec 19 by George V. Hulme

There are many challenges to getting a cybersecurity program right. The right technology must be deployed, managed, and tuned just right, CISOs and security managers must be able to get the necessary executive support and budget to execute on their plans, and their plans have to be well crafted. Not to forget that nearly everyone in the organization has to be security conscious and savvy, or nearly any organization is one phishing-attack click away from compromise.

Read More

For Cloud-native App Security, Few Companies Have Embraced DevSecOps

Dec 13 by George V. Hulme

A recent study identified some startling news when it comes to the state of security and cloud-native apps. The Security for DevOps Enterprise Survey Report, conducted by the research firm Enterprise Strategy Group on behalf of Data Theorem found only 8% of companies are securing 75% or more of their cloud-native applications with DevSecOps practices today.

Read More

Mobile Device Data Breach Leads to $3 Million HIPAA Settlement

Dec 04 by George V. Hulme

While there’s been a lull in 2019, the data breach and regulatory-related fines from the Department of Health and Human Services do keep piling up.

Read More

Study Finds Companies May Be Wise to Share Cybersecurity Efforts

Nov 26 by George V. Hulme

It turns out, if recent research is any indication, when one company is breached in a vertical market other companies in that vertical market become less attractive places for investors to stick their capital. Yet, when companies share their cybersecurity risk management they significantly outperform their peers that don’t disclose their cybersecurity efforts.

Read More

Attackers Outrunning, Outsmarting Healthcare Defenses

Nov 19 by George V. Hulme

According to a new study, 2019 has been yet another brutal year for healthcare cybersecurity. In 2019, so far, nearly four out of five breaches in the industry struck health care providers. And 53% of those attacks were at the hands of external attackers, respondents to a new survey said.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets