Subscribe to Email Updates


Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

First Impressions and Cybersecurity

Oct 15 by George V. Hulme

Some say first impressions aren’t everything, and in many cases first impressions can be wrong. But they certainly are powerful, and bad first impressions can be difficult to overcome. This is true for friendships, dating, potential business partners, and more.

Read More

Organizations Fail to Implement Cloud Security Basics – And it Bites Them

Oct 12 by George V. Hulme

While the early promises in the move to cloud computing promised to simplify cloud management and security, and in many ways these promises have been kept. However, in other ways, cloud environments have increased security complexity. In fact, according to a recent survey, 84% of security professionals report that their organizations struggle to maintain secure cloud configurations.

Read More

When It Comes to Employees and Data, Execs Hold Mixed Views

Oct 07 by George V. Hulme

When it comes to enterprise data, it’s employees that create some of the biggest risks, yet they still hold a considerable amount of trust from senior cybersecurity and business leaders. That’s the dislocated findings from the 2019 Global Data Exposure Report, conducted by Forrester Consulting and commissioned by data loss protection software maker Code42.

Read More

Financial Services Data Breaches: More Pain Ahead?

Sep 13 by George V. Hulme

Banks, like most industries, are undergoing profound digital transformations. They’re trying to compete, lower business risk, and cut costs from their business operations.

Read More

Financial Services: State of Software Security

Aug 29 by George V. Hulme

As we’ve recently covered, cybersecurity in financial services is having a challenging time keeping up with the rate of technological change. A survey conducted by the Ponemon Institute (on behalf of electronic design automation and software security company Synopsys) found that more than half of the financial services companies they surveyed suffered data breaches or system downtime due to attack.

Read More

The Cloud Security Alliance’s Top Threats to Cloud Computing

Aug 26 by George V. Hulme

Periodically the Cloud Security Alliance publishes a report of the top threats to cloud computing. These reports hope to increase the awareness of risks to cloud computing. What’s interesting this year is that certain threats, including denial of service, shared technology vulnerabilities, and cloud service provider data loss and system vulnerabilities were ranked so low in a survey that they didn’t make the new report. They were all included in the Cloud Security Alliances previous report, the Treacherous 12.

Read More

GAO: US Federal Agencies Need to Fully Establish Risk Management Programs

Aug 21 by George V. Hulme

There have been plenty — too many — breaches involving federal agencies over the years. Way back in 2006, a breach at the U.S. Department of Veterans Affairs affected 26.5 million people. In 2009, it was the National Archives and Records Administration that was hit and that breach affected 76 million. In one of the worst and most damaging breaches of all time, the U.S. Office of Personnel Management (OPM) affected 21.5 million federal employees and contractors, and breached the information included in security clearances, such as background investigation data and associated person data. Most recently, the U.S. Customs Agency fell victim to an attack and photos and other personal information collected by U.S. Customers and Border Patrol was leaked.

Read More

When it Comes to Application Security, Banks Pay Little Interest

Aug 16 by George V. Hulme

One might think financial institutions, such as banks, would have formidable levels of application security. Unfortunately, if one thought that, one would be wrong. According to an analysis by application security vendor ImmuniWeb, a startling 97 out of 100 of the world’s largest banks are vulnerable to web and mobile attacks.

Read More

UK Fines Jump Since GDPR Implementation

Aug 12 by George V. Hulme

Commercial law firm Reynolds Porter Chamberlain LLP says that the average fine levied by the Information Commissioner’s Office rose 14% in the year since the introduction of GDPR, increasing from £125,000 in 2017/18 to £143,000 in 2018/19.

Read More

Surprise: Healthcare Organizations Confident in Their Cybersecurity Efforts

Jul 29 by George V. Hulme

Risk management firm LexisNexis Risk Solutions, in conjunction with Information Security Media Group (ISMG), recently announced the results of an online survey they conducted to identify current trends in healthcare cybersecurity. The survey is based on responses from more than 100 participants working within including hospitals, physician group practices and payers. The survey was conducted over the spring of 2019.

Read More

Hospitals, Clinics in Los Angeles Hit by Data Breach

Jul 17 by George V. Hulme

Phishing attacks strike again. Last week, Nemadji Research Corp., which does patient eligibility and billing services work for the Los Angeles County Department of Health Services, discovered that they’d been breached by a phishing attack. The attack enabled the criminals to gain access to the medical records of nearly 15,000 patients.

Read More

Poor Healthcare Industry Security Hygiene Places Lives at Risk

Jul 15 by George V. Hulme

No one wants to go to the doctor’s office. Well, I guess some people do. I’m certainly not one of them. But imagine going to the doctor and then watching in horror as the medical equipment or computers the teams of doctors are working on aren’t working.  That, suddenly, the come under attack just as you are “going under the knife.”

Read More

Cloud Security

Subscribe to Blog Updates

Latest Tweets