Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

One-third of All Vulnerabilities Rated High Risk

Dec 05 by George V. Hulme

First the good news: according to a published report there were more than 16,000 software vulnerabilities disclosed during the first nine months of this year. Now, that’s quite a few vulnerabilities that could enable attackers, exploits, and malware to scurry onto an enterprise environment. However, it is 7 percent fewer vulnerabilities than 2017.

Read More

Think Your Organization Has a Healthy Cybersecurity Culture?

Nov 30 by George V. Hulme

If your organization has a healthy cybersecurity culture, consider yourself lucky — less than five percent of organizations do.

Read More

DevSecOps: More Work Ahead

Nov 02 by George V. Hulme

DevOps has come a long way since it got underway in full force nearly ten years ago.  As was recently made clear at this year’s DevOps Enterprise Summit (DOES) in Las Vegas, DevOps organizations have been successful when it comes to knocking down organizational silos, optimizing the delivery of software services and functionality, and shortening the time it takes to deliver digital value to customers. DevOps organizations are delivering better business outcomes.

Read More

AI Helps Enterprises Conquer IT Speed and Complexity

Oct 31 by George V. Hulme

While many had hoped that along with the rise of cloud computing would come a more simple era of enterprise computing. In some ways, it has. With software as a service enterprise no longer have to contend with managing the infrastructure to support so many applications. With infrastructure as a service enterprises can cut the amount of infrastructure they must manage. It’s reduced the amount of infrastructure and applications that must be directly protected, patched, and maintained. But the era of more simple computing never arose.

Read More

Healthcare.gov Detects Significant Breach On Enrollment Exchanges

Oct 26 by George V. Hulme

The Center for Medicare and Medicaid Services (CMS) announced that it has detected anomalous activity in its Federally Facilitated Exchanges (FFEs) Direct Enrollment pathway for agents and brokers. This is the system that enables agents and brokers to help consumers with their coverage applications to the FFEs. One can imagine the type and quantity of sensitive information shared on these systems.

Read More

The Danger of Shadow IT Shines Again

Oct 23 by George V. Hulme

It was late September when the news broke that the personal data of 1.5 million citizens had been stolen from a government health database in Singapore, SingHealth. While authorities called the attack targeted and well-planned, the evidence coming out points to potential mismanagement of the server as being the likely culprit.

Read More

When it Comes to Container Security Enterprises Are Their Own Worst Enemy

Oct 16 by George V. Hulme

Much like the early days of virtualization, containers got a bum rap when it came to data security. I say this because just like virtualization, securing containers is more about securing what is happening inside, rather than the security of the wrapper.

Read More

HHS Urges FDA to Do More on Medical Device Security

Oct 08 by George V. Hulme

We’ve been writing for a few years now about the dangers of connected medical devices and how the U.S. F.D.A. has sought to increase the security of these devices. Previously, in St. Jude Takes Steps to Secure Vulnerable Medical Implants we covered the security surrounding St. Jude medical devices. We covered how the FDA Seeks Secure Medical Device Development Lifecycle and the FDA Prescribes Safer Path for Connected Medical Devices.

Read More

As Bots and Robotic Processes Rise in the Enterprise, so Do Security Risks

Sep 25 by George V. Hulme

As business-technology systems grow more complex, so does the need to automate essential management and security processes. With hybrid cloud architectures, DevOps management approaches, and continuous software delivery pipelines, organizations need to automate as many processes as they can automate. For those tasks that require little or no deviation, many enterprises are turning to Robotic Process Automation (RPA).

Read More

Enterprises Still Struggle to Put the Sec in DevOps

Sep 12 by George V. Hulme

Despite it being considered an essential practice, most organizations still find it difficult implementing security into their DevOps efforts. It’s not that they don’t want to, they say they do, it’s that they just haven’t provided their developers the tools, processes, or even training to get it done. These are the findings of a report recently released by application security vendor Checkmarx.

Read More

A Real-world Deep Dive into the Top Cloud Threats

Sep 03 by George V. Hulme

For years now, the cloud computing alliance has been working to identify the top threats to cloud computing. In 2012 they published a survey that identified the top threats to cloud at the time, and two years ago they published The Treacherous 12 Cloud Computing Top Threats in 2016. That report reflected the consensus among security experts in the CSA community regarding the most significant security issues in the cloud.

Read More

Researchers Find Power Grid, IoT Device Security a Dangerous Mix

Aug 29 by George V. Hulme

Smart connected appliances, should they be commandeered by attackers for use in a botnet, could result in everything from local power outages to severe wide-scale blackouts a team of Princeton University researchers contended at the USENIX Security Symposium.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets