George V. Hulme
Recent Posts
The high costs of attacks on cloud services
Attacks on cloud systems and infrastructure are costly. Consider the recent massive ...
IoT Security: Cloud Security Alliance Shows a Way
CSA hopes its move will provide actionable and useful IoT security guidance
Despite Security Fears, Digital Transformation and the Cloud Journey Continue
Many enterprises today are deeply entrenched in their digital transformation efforts, so ...
Calculating the economic impact of security incidents on critical infrastructure remains elusive
With the rise of APTs and the continued interconnection of critical infrastructure ...
Getting executive buy-in for identity management
Some enterprise technology deployments can be handled entirely by IT, don’t require ...
International Association of Certified ISAOs launches as global leadership association to support security threat and defense information
There are few things that everyone in the information security industry agrees upon, but the ...
Big Black Hat 2016 Story Round-up
The hacks and vulnerabilities out of Black Hat USA are interesting every year. Last year ...
The five keys to securing the citizen developer
There’s a new kind of developer in town. These developers have no training in software ...
The State of Open Source in the Software Supply Chain
Open source supply chain automation vendor Sonatype released its State of the Software ...
Reckless insiders pose significant security risks
It’s well known that insiders pose a significant threat to enterprise security.
Healthcare Security Q&A with Eric W. Cowperthwaite
In the recent post, Healthcare Security Lapses: No Signs of Slowdown, we discussed just how ...
How security teams commonly sabotage their own efforts
It seems there’s no shortage of enterprises that fall short when it comes to protecting ...