Subscribe to Email Updates


Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Jan 03 by George V. Hulme
  • Not enough organizations are continuously looking for risks in their IT assets.
  • Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
  • Enterprises need to put monitoring regimes in place that can keep pace with technological change.
Read More

No-code, Low-code Development: An Enterprise Priority With Data Risks

Dec 16 by George V. Hulme
  • Demand for digital transformation is driving low code development platforms.
  • While line-of-business workers creating software alleviates development team burdens, it can increase risk.
  • Enterprises must ensure that they are managing all apps in their portfolio.
Read More

IoT Security Bill Signed Into U.S. Law

Dec 08 by George V. Hulme
  • Too many IoT devices ship from the manufacturer with vulnerabilities and inadequate ways to update devices once they are deployed.
  • The U.S. federal government hopes to establish a security standard through the National Institute of Standards and Technology.
  • The U.S. federal government hopes it will be able to positively influence the security of IoT devices through its purchasing power
Read More

Enterprises Skimping On Basic Cybersecurity Controls

Nov 25 by George V. Hulme
  • The benefits of connected medical devices outweigh the risks.
  • Despite remote security risks, businesses failing to take basic steps to mitigate risk
  • Still, many enterprises believe increased remote work will remain long after the pandemic passes
  • There are steps enterprises should take to mitigate data security risks
Read More

Despite Security Concerns, Connected Medical Device Use Soars

Nov 23 by George V. Hulme
  • The benefits of connected medical devices outweigh the risks.
  • While healthcare organizations know what steps they must take to secure these devices, the right precautions aren't taken
  • too often.
  • Security deficiencies include lack of network segmentation, poor implementation of encryption and protocols.
Read More

Attacks Targeting the Healthcare Industry Grow Increasingly Severe

Nov 10 by George V. Hulme
  • Healthcare providers are under enormous pressure to both deliver care and defend against cyberattacks.
  • Last week, providers in the U.S. experienced an unprecedented level of attacks targeting healthcare systems.
  • Hopefully, with investments being made, the healthcare industry takes the steps they must to improve their security defenses.
Read More

Cybersecurity Burnout Persists

Nov 09 by George V. Hulme
  • The majority of cybersecurity professionals believe they are overworked or burned out.
  • Survey finds security professionals don't get the support they need from their organizations to succeed.
  • Overall, challenges around managing staff remains a big hurdle for cybersecurity programs.
Read More

WFH, IoT and The Rising Enterprise Attack Surface

Oct 22 by George V. Hulme
  • The smart home market is rapidly growing, and the work from home movement has proven to be even more of a catalyst.
  • Consumer IoT devices are fraught with vulnerabilities, and consumers don’t know how to protect their networks.
  • Consumer IoT devices on home networks place enterprise systems at risk, and enterprises must take necessary steps to protect themselves.
Read More

To Succeed, Security Leaders Must Align Themselves With The Business

Oct 05 by George V. Hulme
  •  Aligning organizational business objectives with security has always been challenging
  • New initiatives are often kicked-off without security being a consideration
  • Analyst firm finds, when security and business objectives are aligned, there are tangible business benefits
Read More

Healthcare Institutions Fall Short of National Cybersecurity Standards

Sep 22 by George V. Hulme
  • Healthcare breaches continue in high numbers
  • Vendor report details minority of healthcare providers can't meet NIST CSF criteria
  • Healthcare providers can get back on track, but it will take a strong focus on an effective remediation plan
Read More

Healthcare Data Breach Costs Rise

Aug 20 by George V. Hulme

Getting to understand the costs of data breaches is always tricky. Deciding what variables need to be part of the equation is always tricky. And so is determining the actual costs of such nebulous concepts as "customer churn." But whether it's possible to peg the precise cost of a data breach, there is plenty to learn from trying and looking at trends. One lesson that is clear year after year is that it's regulated industries that pay more for data breaches. This year healthcare is the regulated market that spent the most due to a data breach.

Read More

Murphy’s Law and Essential Lesson Enterprises Need To Learn From The Twitter Attack

Aug 04 by George V. Hulme

On the evening of July 15, 2020, Twitter users watched one of the most high-profile attacks to occur in years unfold in real-time as imposters sent a series of fraudulent Tweets from the accounts of about 130 celebrities, politicians, and tech industry luminaries. Tweets that promised to provide $2,000 for every $1,000 sent to a Bitcoin address. There are a number of important lesson here for all enterprises, but one that especially stands out.

Read More

Cloud Security

Subscribe to Blog Updates

Posts by Categories

Latest Tweets