Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

To Succeed, Security Leaders Must Align Themselves With The Business

Oct 05 by George V. Hulme
  •  Aligning organizational business objectives with security has always been challenging
  • New initiatives are often kicked-off without security being a consideration
  • Analyst firm finds, when security and business objectives are aligned, there are tangible business benefits
Read More

Healthcare Institutions Fall Short of National Cybersecurity Standards

Sep 22 by George V. Hulme
  • Healthcare breaches continue in high numbers
  • Vendor report details minority of healthcare providers can't meet NIST CSF criteria
  • Healthcare providers can get back on track, but it will take a strong focus on an effective remediation plan
Read More

Healthcare Data Breach Costs Rise

Aug 20 by George V. Hulme

Getting to understand the costs of data breaches is always tricky. Deciding what variables need to be part of the equation is always tricky. And so is determining the actual costs of such nebulous concepts as "customer churn." But whether it's possible to peg the precise cost of a data breach, there is plenty to learn from trying and looking at trends. One lesson that is clear year after year is that it's regulated industries that pay more for data breaches. This year healthcare is the regulated market that spent the most due to a data breach.

Read More

Murphy’s Law and Essential Lesson Enterprises Need To Learn From The Twitter Attack

Aug 04 by George V. Hulme

On the evening of July 15, 2020, Twitter users watched one of the most high-profile attacks to occur in years unfold in real-time as imposters sent a series of fraudulent Tweets from the accounts of about 130 celebrities, politicians, and tech industry luminaries. Tweets that promised to provide $2,000 for every $1,000 sent to a Bitcoin address. There are a number of important lesson here for all enterprises, but one that especially stands out.

Read More

Open-Source Security Is Essential To Enterprise Security

Aug 03 by George V. Hulme

Nearly a decade ago, Marc Andreessen wrote in the Wall Street Journal how software was “eating the world.” And in this age of digital transformation, that’s most certainly true. Software is now everywhere and consists of everything. Today, enterprises build more customer-facing and software-driven services than ever before. Software bots are automating manual processes, and software plays an increasingly central role in every machine and device we use.

Read More

Enterprises See Rise in Data Breach Costs, Shift in Security Spending Focus

Jul 29 by George V. Hulme

A study of more than 5,500 companies within eight countries found that businesses affected by cyber incidents witnessed their losses rise from $10,000 per incident to $57,000.

Read More

Raft of Healthcare Breaches Continue

Jul 23 by George V. Hulme

Attacks targeting healthcare organizations just won’t let up. In early June, the University of California San Francisco (UCSF) announced that their IT team identified a limited security breach within a part of the UCSF School of Medicine’s IT environment.

Read More

Enterprises Bring Security Bad Habits Along With Their Digital Transformation Efforts

Jun 30 by George V. Hulme

As enterprises continue with their digital transformations by automating their manual workflows, moving existing applications to the cloud, and developing and deploying new applications at a record pace, they’re also rapidly increasing the complexity in their environments, and as a result security controls and processes that should be in place continue to slip.

Read More

Number of Breached Records Continues to Soar

Jun 23 by George V. Hulme

We get so deluged with news stories about data breaches that it’s easy to lose sight of the forest for the trees. Consider, according to a newly released report from ForgeRock, the ForgeRock Consumer Identity Breach Report, which found that more than 5 billion records were exposed last year. That’s a lot of information on a lot of information pertaining to a lot of people.

Read More

Misconfigurations, Poorly Managed Access Help Drive Data Breach Risks

Jun 20 by George V. Hulme

Enterprise digital transformations are making the jobs of enterprise security teams to properly manage and secure their environments even more challenging. After all, as digital transformations have rapidly increased the complexity of environments as technology teams strain to maintain existing systems, deploy new cloud services, manage IoT devices, and constantly develop and deploy more applications.  

Read More

As Layoffs Loom, Be Cognizant of Increased Insider Risk

Jun 19 by George V. Hulme

Since the very beginnings of the novel coronavirus (COVID-19) pandemic, businesses of all sizes have struggled to adjust to the new occupational normal. IT teams have not been immune to the disruption. Neither have information security teams for that matter. While employment in the IT sector remains much more resilient than other segments of the economy, employment in the IT sector still declined by about 1% last month, even as businesses compete for technical talent and continue digital transformations.

Read More

Apple Announced Open Source Password Management Initiative

Jun 17 by George V. Hulme

Passwords are a huge hassle. We all must use them, and generally hate doing so. There’s no way to sugarcoat it. The typical user has hundreds of username and password combinations that they must remember and manage. We all forget and must reset passwords regularly. And, over time, many of these accounts, along with the associated passwords, will be abandoned. And over time, they will be compromised. Because so many people reuse their passwords, those credentials will lead to data breaches.

Read More

Cloud Security




Subscribe to Blog Updates

Posts by Categories

Latest Tweets