George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.
Find me on:

Recent Posts

Feb 10, 2017

Kicking off RSA Conference 2017 With DevOps and Cloud Security

Last year was a record year when it came to attendance for the RSA Conference. More than ...

Jan 31, 2017

Pay Up or Locked Out: Ransomware Targeting Hospitality Industry

It turns out that story about guests being locked out of, and locked into, their hotel rooms ...

Jan 17, 2017

St. Jude Takes Steps to Secure Vulnerable Medical Implants

Last week medical device maker St. Jude Medical provided security patches and guidelines ...

Jan 05, 2017

The Five Most Noteworthy Breaches of 2016

Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while ...

FDA Prescribes Safer Path for Connected Medical Devices

The U.S. Government has taken steps it hopes will better protect the users of medical ...

Bug Bounty Programs: Significant Benefits, Challenges

There are many reasons why an enterprise may want to implement a bug bounty program. Most ...

The big cybersecurity trends that will likely continue through 2017

Predictions are never easy, and they are seldom right or very useful: but they are always ...

Nov 24, 2016

Insecure IoT Devices find their way on Enterprise Networks

When the topic of IoT security comes up, it’s often considered a consumer security issue – ...

Optimize security in an increasingly complex world

There’s no doubt that enterprise environments are growing more complex by the day. Just ...

The significant impact of containers on security

Most every business that is embracing DevOps methodologies is also deploying containers – or ...

Must cybersecurity inhibit innovation?

It’s absolutely true that, more often than not, security is a barrier to getting things ...

Cloud Spending Spurs Security Spending Increase

As enterprises increasingly embrace cloud computing and cloud services, they must also ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW