Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

New U.S. Federal Data Breach Disclosure Rules May Be Imminent — Here’s what it means

Apr 02 by George V. Hulme
  • Executive order under consideration would expand what companies have to disclose security breaches to the federal government.
  • Such breach disclosure laws have been long found over legal concerns.
  • The EO would also establish that certain software vendors maintain a software bill of materials.
Read More

Malware Delivered Via Cloud Services Rises

Mar 23 by George V. Hulme
  • 53% of Web traffic is now cloud-related, a 20% year over year increase.
  • 61% of all malware is directly delivered via the cloud.
  • Malicious Office documents represented 17% of all malware detected.
Read More

Big Enterprise IoT Device Security Considerations

Mar 22 by George V. Hulme
  • Analysts expect the global IoT market to grow from about $212 billion in 2018 to about 1.3 trillion by 2026
  • Unfortunately, these devices often ship with security flaws, poor API management, and lack efficient ways to provide security updates
  • Special Publication 800-213 helps federal agencies understand how IoT devices can impact the network and information security risks within their organizations
Read More

Remote Work and the Long-Term Impact on Risk

Mar 04 by George V. Hulme
  • 83% of employers now say the shift to remote work has been successful for their company, compared to 73% in a prior survey.
  • Less than one in five executives say they want to return to the office as it was pre-pandemic.
  • Enterprises are going to have to balance convenience and security over the long haul.
Read More

Toward the post COVID-19 Security Posture

Feb 15 by George V. Hulme
  • As enterprises get comfortable with remote work, their priorities are going to shift.
  • Cybersecurity will be forefront in the year ahead between concerns about cyber espionage and ongoing nation-state attacks, and federal cybersecurity organizational efforts.
  • Remote work has accelerated enterprises are turning zero trust architectures to improve their security.
Read More

Cloud Security Alliance Provides Enhanced IoT Security Guidance

Feb 12 by George V. Hulme
  • As enterprises, and their home workers, deploy IoT devices, the risks these devices pose to enterprise data and systems increases.
  • First released in 2019, the IoT Security Controls Framework established 155 essential security controls that the CSA believed would mitigate many of IoT's risk.
  • The new version of the CSA IoT Security Controls Framework provides clarity on guidance and security enhancements
Read More

The 2020 Year in Cybersecurity Review

Jan 25 by George V. Hulme
  • When it came to healthcare security, 2020 proved to be a continuation of the state of cybersecurity in prior years.
  • While there was considerable concern about some type of digital attacks during the U.S. presidential elections, so far, there's been no credible evidence showing such occurred.
  • One of the more interesting attacks last year was one everyone had the opportunity to watch occur in real-time. And that's the Twitter attack that resulted in the widespread tweeting of a bitcoin scam the summer.
Read More

Despite Rising Vulnerabilities, Majority of Organizations Don’t Perform Continuous Security Monitoring

Jan 03 by George V. Hulme
  • Not enough organizations are continuously looking for risks in their IT assets.
  • Interestingly, organizations with immature programs are more confident in their ability to manage their attack surface.
  • Enterprises need to put monitoring regimes in place that can keep pace with technological change.
Read More

No-code, Low-code Development: An Enterprise Priority With Data Risks

Dec 16 by George V. Hulme
  • Demand for digital transformation is driving low code development platforms.
  • While line-of-business workers creating software alleviates development team burdens, it can increase risk.
  • Enterprises must ensure that they are managing all apps in their portfolio.
Read More

IoT Security Bill Signed Into U.S. Law

Dec 08 by George V. Hulme
  • Too many IoT devices ship from the manufacturer with vulnerabilities and inadequate ways to update devices once they are deployed.
  • The U.S. federal government hopes to establish a security standard through the National Institute of Standards and Technology.
  • The U.S. federal government hopes it will be able to positively influence the security of IoT devices through its purchasing power
Read More

Enterprises Skimping On Basic Cybersecurity Controls

Nov 25 by George V. Hulme
  • The benefits of connected medical devices outweigh the risks.
  • Despite remote security risks, businesses failing to take basic steps to mitigate risk
  • Still, many enterprises believe increased remote work will remain long after the pandemic passes
  • There are steps enterprises should take to mitigate data security risks
Read More

Despite Security Concerns, Connected Medical Device Use Soars

Nov 23 by George V. Hulme
  • The benefits of connected medical devices outweigh the risks.
  • While healthcare organizations know what steps they must take to secure these devices, the right precautions aren't taken
  • too often.
  • Security deficiencies include lack of network segmentation, poor implementation of encryption and protocols.
Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets