Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Five Security Books You Should Read if You Haven’t

Feb 14 by George V. Hulme

-

Read More

Cloud use is growing, and your cloud security strategy must grow with it

Feb 07 by George V. Hulme

Is this cloud security Nirvana? 

While many organizations moved to the cloud to try to simplify their IT management, including improve security, they’re learning that it’s not as simple as “shift applications to the cloud and watch the magic happen.”

Read More

US Commerce on Security and Market Incentives — Consumers don’t want security

Jan 22 by George V. Hulme

In a report published by the U.S. Departments of Commerce and Homeland Security concluded what most security professionals have known for years: that botnets are a global threat, that technologies exist to mitigate the threats but aren’t widely used for multiple reasons, poor product security design and development, counter-productive market incentives, and low education and awareness across all market participants.

Read More

What are your 2018 cybersecurity intentions?

Jan 10 by George V. Hulme

With another year of too many high profile, and quite frankly avoidable, data breaches under our belts, it’s time to take a look forward and identify areas where you may be able to improve your security program and hopefully become more efficient and reduce risk more effectively.

Read More

Six ways security teams sabotage their own plans

Jan 08 by George V. Hulme

It’s not always the bad guys that sabotage enterprise security efforts, sometimes organizations do that all on their own.

Read More

Need container and microservice security? Automation Is Key

Jan 02 by George V. Hulme

When it comes to enterprise security, cloud was supposed to help simplify security efforts. But it didn’t turn out that way. Today, the typical large enterprise has its legacy environments, public clouds, private clouds, private hosted clouds, and various hybrid flavors of each to secure. And within those systems applications are becoming containerized, and broken into many different discrete services. All of this is not only fundamentally changing the way enterprises must secure their environments, but also significantly increasing the complexity in doing so.

Read More

Get more value from your threat intelligence

Dec 27 by George V. Hulme

Many cybersecurity organizations are of the opinion that threat intelligence can prevent, or if not prevent entirely at least lessen, the impact of successful breaches.

Read More

Cloud computing and the amplified insider threat

Dec 01 by George V. Hulme

When it comes to insider threats, the nature of the threats is largely the same regardless of the computing environment, such as whether the data and apps reside on-premises, public cloud, or provide cloud — the risk of data exfiltration, data destruction, theft, and similar is ever-present.

Read More

Five keys to consider when it comes to securing containers

Nov 14 by George V. Hulme

Software containers are among the hottest aspects of enterprise technology right now. Sure, containers help enterprises save budget through, just like virtualization, the improvement of hardware density. But that’s not really why enterprises are turning to containerization. It’s how application containers bring to modern cloud environments improved manageability and the ability to deploy applications as discrete functions that can be used at will and reused elsewhere in the environment, wherever needed, as a service.

Read More

Survey finds hybrid cloud security growing pains

Nov 07 by George V. Hulme

There’s no doubt that enterprises are embracing cloud computing, but not-so-surprising that enterprises repeatedly say that they need heightened visibility and security management capabilities so they can more effectively deploy applications, defend against cyberattacks, and mitigate regulatory compliance risks, a recent survey found.

Read More

FDA Seeks Secure Medical Device Development Lifecycle

Nov 06 by George V. Hulme

Business Insights readers are certainly well aware of the sorry state of connected medical device security. We’ve covered it in posts such as St. Jude Takes Steps to Secure Vulnerable Medical Implants and U.S. DHS and FDA Face Medical Device Security Woes. In the later post we covered how the FDA is working to foster a culture of continuous quality improvement.

Read More

Research Suggests Doubts Persist over Cloud Cost, Integration, and Flexibility

Oct 23 by George V. Hulme

In a survey and research, The Future of Hybrid Cloud, highlights that while enterprises are moving to cloud — it’s not a smooth transition as some like to proclaim.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets