Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Most companies don’t secure confidential docs

Mar 23 by George V. Hulme

A vital, actually a most fundamental, aspect of enterprise security is helping organizations to keep confidential information confidential. This is why security at the data and document level is something to which much more attention should be paid by enterprises. 

Read More

Healthcare keeps taking the data breach hits

Mar 10 by George V. Hulme

The hits to the healthcare industry keep on coming. While the number of overall data breaches tracked by the Identity Theft Resource Center (ITRC) hit a record in 2016, with 1,093, which is a 40 percent increase over the previous record in 2015 of 780 breaches – It’s healthcare that continues to grow the most.

Read More

Clouds, Containers, & Cybersecurity Skills Gap Drive Security Services Demands

Mar 07 by George V. Hulme

When it comes to the business of information security, and the big technology trends that will likely shape the year ahead, the RSA Conference is perhaps the most important event of the year. And with a record attendance of more than 43,000, this year was no exception.

Read More

Shadow IT Back in Spotlight

Mar 02 by George V. Hulme

When it comes to shadow IT, government can face just as much of a challenge as the typical enterprise. Last week, the Office of Inspector General (OIG) for the General Services Administration (GSA) published a report which found that GSA’s Office of 18F had “routinely disregarded and circumvented fundamental security policies and guidelines.”

Read More

Kicking off RSA Conference 2017 With DevOps and Cloud Security

Feb 10 by George V. Hulme

Last year was a record year when it came to attendance for the RSA Conference. More than 40,000 attendees arrived at the Moscone Center to learn about and discuss the latest in cybersecurity trends ranging from cybersecurity big data analytics, application security, to forensics and incident response and everything in-between.

Read More

Pay Up or Locked Out: Ransomware Targeting Hospitality Industry

Jan 31 by George V. Hulme

It turns out that story about guests being locked out of, and locked into, their hotel rooms in a four-star hotel in Austria aren’t exactly accurate. According to this story in The Verge, Don’t believe the story about hackers locking guests in their rooms at a luxury hotel while what happened is still very interesting, and of concern to any traveler, what was reported wasn’t entirely accurate.

Read More

St. Jude Takes Steps to Secure Vulnerable Medical Implants

Jan 17 by George V. Hulme

Last week medical device maker St. Jude Medical provided security patches and guidelines necessary regarding vulnerabilities in its Internet connected medical devices that were uncovered this summer. You can read the original report from investment research firm Muddy Waters Research here.

Read More

The Five Most Noteworthy Breaches of 2016

Jan 05 by George V. Hulme

Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while we experienced  the traditional breaches this year—data theft for fraud, identity theft, and financial gain—many of the most significant breaches this year were not financially motivated, but political or activist in nature.

Read More

FDA Prescribes Safer Path for Connected Medical Devices

Jan 04 by George V. Hulme

The U.S. Government has taken steps it hopes will better protect the users of medical devices, such as pacemakers and insulin pumps, from cyberattacks. For years now the risks of connected medical devices have been demonstrated and well-known. It’s an area we’ve covered here for some time.  

Read More

Bug Bounty Programs: Significant Benefits, Challenges

Jan 03 by George V. Hulme

There are many reasons why an enterprise may want to implement a bug bounty program. Most notably is that no matter how good an organization’s software testing is, how proficiently developers code security, or how thorough an organization’s software security assessments– there will always be flaws. These flaws make it possible for attackers to exploit security vulnerabilities and bypass security defenses.

Read More

The big cybersecurity trends that will likely continue through 2017

Dec 12 by George V. Hulme

Predictions are never easy, and they are seldom right or very useful: but they are always fun. And as the holiday season is upon us and the New Year approaches so does the time of year reflection and, you guessed it: cybersecurity predictions.

Read More

Insecure IoT Devices find their way on Enterprise Networks

Nov 24 by George V. Hulme

When the topic of IoT security comes up, it’s often considered a consumer security issue – fancy controllable houselights, baby monitors, home security systems, and anything else that can be networked. That’s a mistake and IoT devices are certainly marching onto the enterprise. Earlier this week Zscaler published results that took a look at IoT security, and they found a number of enterprise devices were comprised, as well as a number of other startling results.

Read More