George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.
Find me on:

Recent Posts

Jan 08, 2018

Six ways security teams sabotage their own plans

It’s not always the bad guys that sabotage enterprise security efforts, sometimes ...

Jan 02, 2018

Need container and microservice security? Automation Is Key

When it comes to enterprise security, cloud was supposed to help simplify security efforts. ...

Get More Value From Your Threat Intelligence

Many cybersecurity organizations are of the opinion that threat intelligence can prevent, or ...

Cloud computing and the amplified insider threat

When it comes to insider threats, the nature of the threats is largely the same regardless ...

Five keys to consider when it comes to securing containers

Software containers are among the hottest aspects of enterprise technology right now. Sure, ...

Survey finds hybrid cloud security growing pains

There’s no doubt that enterprises are embracing cloud computing, but not-so-surprising that ...

FDA Seeks Secure Medical Device Development Lifecycle

Business Insights readers are certainly well aware of the sorry state of connected medical ...

Research Suggests Doubts Persist over Cloud Cost, Integration, and Flexibility

In a survey and research, The Future of Hybrid Cloud, highlights that while enterprises are ...

Warning: Data Breaches In News Always Worse Than They First Appear

Not too long ago news broke of yet another substantial data breach. This time at financial ...

Mobile Stock Trading Apps Found To Be Poorly Secured

Security research firm IOActive recently set out to investigate the security of 21 mobile ...

Linux Users, especially those in IoT, remain At-risk

If you are a Linux user you might want to keep an extra eye on your systems and be ready to ...

Duo Labs find thousands of ‘hidden’ vulnerable Macs

Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW