Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Five keys to consider when it comes to securing containers

Nov 14 by George V. Hulme

Software containers are among the hottest aspects of enterprise technology right now. Sure, containers help enterprises save budget through, just like virtualization, the improvement of hardware density. But that’s not really why enterprises are turning to containerization. It’s how application containers bring to modern cloud environments improved manageability and the ability to deploy applications as discrete functions that can be used at will and reused elsewhere in the environment, wherever needed, as a service.

Read More

Survey finds hybrid cloud security growing pains

Nov 07 by George V. Hulme

There’s no doubt that enterprises are embracing cloud computing, but not-so-surprising that enterprises repeatedly say that they need heightened visibility and security management capabilities so they can more effectively deploy applications, defend against cyberattacks, and mitigate regulatory compliance risks, a recent survey found.

Read More

FDA Seeks Secure Medical Device Development Lifecycle

Nov 06 by George V. Hulme

Business Insights readers are certainly well aware of the sorry state of connected medical device security. We’ve covered it in posts such as St. Jude Takes Steps to Secure Vulnerable Medical Implants and U.S. DHS and FDA Face Medical Device Security Woes. In the later post we covered how the FDA is working to foster a culture of continuous quality improvement.

Read More

Research Suggests Doubts Persist over Cloud Cost, Integration, and Flexibility

Oct 23 by George V. Hulme

In a survey and research, The Future of Hybrid Cloud, highlights that while enterprises are moving to cloud — it’s not a smooth transition as some like to proclaim.

Read More

Warning: Data Breaches In News Always Worse Than They First Appear

Oct 12 by George V. Hulme

Not too long ago news broke of yet another substantial data breach. This time at financial consultancy Deloitte — one of the so-called big four accounting firms. On Sept 25, Deloitte announced that it had detected a breach stemming from an inadequately secured administrative email system that gave the attacker(s) access to the firm’s global email system.

Read More

Mobile Stock Trading Apps Found To Be Poorly Secured

Oct 11 by George V. Hulme

Security research firm IOActive recently set out to investigate the security of 21 mobile brokerage apps used for trading stocks and other equities. The results were less than reassuring.  

Read More

Linux Users, especially those in IoT, remain At-risk

Oct 10 by George V. Hulme

If you are a Linux user you might want to keep an extra eye on your systems and be ready to patch — as soon as patches do become available that is. Google researchers this week made public seven vulnerabilities they uncovered in the Linux DNS software package Dnsmasq. 

Read More

Duo Labs find thousands of ‘hidden’ vulnerable Macs

Oct 03 by George V. Hulme

Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system patching levels. The security firm Duo Labs recently set out to study the security of Mac firmware, more specifically the EFI (Extensible Firmware Interface) in Macs for the past three years. Think of EFI as the modern BIOS (Basic Input / Output System) manages the boot process of a computer system as well as communications between the operating system and other devices such as video, keyboard, printers, and mice.

Read More

U.S. DHS and FDA Face Medical Device Security Woes

Sep 25 by George V. Hulme

While most eyes interested in cybersecurity for the past two weeks have been focused upon (and for good reason) the Equifax breach, the U.S. Food and Drug Administration (FDA) continued its pressure on medical device manufacturers to build security into product design — just as the U.S. Department of Homeland Security warned the medical community of eight vulnerabilities in Smiths medical wireless infusion pumps.

Read More

In the wake of the Equifax data breach, what do you do now to protect yourself?

Sep 12 by George V. Hulme

The second rule of data breaches should be (the first being don’t have one) to stop doing harm. On this account, Experian failed considerably.

Read More

Five Must-See DEF CON Talks Available Now on YouTube

Sep 11 by George V. Hulme

We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.

Read More

Healthcare data breaches on the rise

Aug 21 by George V. Hulme

An analysis of healthcare data breaches for the first half of the year shows that the healthcare industry is on the path to suffer more one data breach a day this year.

Read More

Cloud Security

Virtualization Security




Subscribe to Blog Updates

Latest Tweets