George V. Hulme
Recent Posts
Kicking off RSA Conference 2017 With DevOps and Cloud Security
Last year was a record year when it came to attendance for the RSA Conference. More than ...
Pay Up or Locked Out: Ransomware Targeting Hospitality Industry
It turns out that story about guests being locked out of, and locked into, their hotel rooms ...
St. Jude Takes Steps to Secure Vulnerable Medical Implants
Last week medical device maker St. Jude Medical provided security patches and guidelines ...
The Five Most Noteworthy Breaches of 2016
Let’s face it, when it comes to cybersecurity, 2016 was quite a fascinating year. And while ...
FDA Prescribes Safer Path for Connected Medical Devices
The U.S. Government has taken steps it hopes will better protect the users of medical ...
Bug Bounty Programs: Significant Benefits, Challenges
There are many reasons why an enterprise may want to implement a bug bounty program. Most ...
The big cybersecurity trends that will likely continue through 2017
Predictions are never easy, and they are seldom right or very useful: but they are always ...
Insecure IoT Devices find their way on Enterprise Networks
When the topic of IoT security comes up, it’s often considered a consumer security issue – ...
Optimize security in an increasingly complex world
There’s no doubt that enterprise environments are growing more complex by the day. Just ...
The significant impact of containers on security
Most every business that is embracing DevOps methodologies is also deploying containers – or ...
Must cybersecurity inhibit innovation?
It’s absolutely true that, more often than not, security is a barrier to getting things ...
Cloud Spending Spurs Security Spending Increase
As enterprises increasingly embrace cloud computing and cloud services, they must also ...