George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.
Find me on:

Recent Posts

Healthcare Security Lapses: No Signs of Slowdown

Healthcare-related data breaches just are showing no signs of slowing down. Just last week, ...

Cyber insurance market remains fluid

We’ve been writing a lot about cybersecurity insurance - most recently in Cybersecurity ...

The essential value of good threat intelligence

In reaction to the rising complexity and increased damage of certain cyber-attacks, more ...

Building a Culture of Security

Some argue that successful information security is a matter of getting the technology right. ...

Cybersecurity Insurance: Closing the Widening Risk Gap

It seems no matter how hard enterprises try, no matter what investments in security controls ...

Cybersecurity Data: Are We Sharing Enough?

There has been a lot of discussion recently about the need for improved cybersecurity ...

Apr 05, 2016

Security Skills Stay in Hot Demand

The cybersecurity jobs market is white hot and is showing no signs of letting up. How hot is ...

Mar 08, 2016

Women in Security Moving Up the Ranks, but Still Small Percentage of Overall Cybersecurity Workforce

The good news is women are moving up in the ranks in the field, but the bad news is that ...

Feb 29, 2016

Continuous Software Assessment for Highly Secure Web Applications

If your organization isn’t being systematic and proactive when it comes to securing your web ...

Enterprises Strive More for Data Protection in Hand and in Cloud

In a recently released survey, Defending Data: Turning Cybersecurity Inside Out With ...

When It Comes to Breach Response, Enterprises Need to Up Their Game with Teamwork

Enterprises today are engaged in a never ending arms race with malicious and criminal ...

Feb 11, 2016

IT Security Budgets, and the Lost Opportunities of Poor Communication

Many of the cybersecurity challenges that CISOs, CIOs, and business leaders face today are ...

Subscribe to Blog Updates

On-demand Webinar

2023 MITRE Engenuity ATT&CK® Evaluations: Enterprise -Deciphering the Results

WATCH NOW