Subscribe to Email Updates

Subscribe

Author: George V. Hulme

George V. Hulme is an internationally recognized information security and business technology writer. For more than 20 years Hulme has written about business, technology, and IT security topics. From March 2000 through March 2005, as senior editor at InformationWeek magazine, he covered the IT security and homeland security beats. His work has appeared in CSOOnline, ComputerWorld, Network Computing, Government Computer News, Network World, San Francisco Examiner, TechWeb, VARBusiness, and dozens of other technology publications.

All about Virtualization and Cloud Security | Recent Articles:

Warning: Data Breaches In News Always Worse Than They First Appear

Oct 12 by George V. Hulme

Not too long ago news broke of yet another substantial data breach. This time at financial consultancy Deloitte — one of the so-called big four accounting firms. On Sept 25, Deloitte announced that it had detected a breach stemming from an inadequately secured administrative email system that gave the attacker(s) access to the firm’s global email system.

Read More

Mobile Stock Trading Apps Found To Be Poorly Secured

Oct 11 by George V. Hulme

Security research firm IOActive recently set out to investigate the security of 21 mobile brokerage apps used for trading stocks and other equities. The results were less than reassuring.  

Read More

Linux Users, especially those in IoT, remain At-risk

Oct 10 by George V. Hulme

If you are a Linux user you might want to keep an extra eye on your systems and be ready to patch — as soon as patches do become available that is. Google researchers this week made public seven vulnerabilities they uncovered in the Linux DNS software package Dnsmasq. 

Read More

Duo Labs find thousands of ‘hidden’ vulnerable Macs

Oct 03 by George V. Hulme

Thousands of Apple Macs vulnerable to un-patched firmware, regardless of operating system patching levels. The security firm Duo Labs recently set out to study the security of Mac firmware, more specifically the EFI (Extensible Firmware Interface) in Macs for the past three years. Think of EFI as the modern BIOS (Basic Input / Output System) manages the boot process of a computer system as well as communications between the operating system and other devices such as video, keyboard, printers, and mice.

Read More

U.S. DHS and FDA Face Medical Device Security Woes

Sep 25 by George V. Hulme

While most eyes interested in cybersecurity for the past two weeks have been focused upon (and for good reason) the Equifax breach, the U.S. Food and Drug Administration (FDA) continued its pressure on medical device manufacturers to build security into product design — just as the U.S. Department of Homeland Security warned the medical community of eight vulnerabilities in Smiths medical wireless infusion pumps.

Read More

In the wake of the Equifax data breach, what do you do now to protect yourself?

Sep 12 by George V. Hulme

The second rule of data breaches should be (the first being don’t have one) to stop doing harm. On this account, Experian failed considerably.

Read More

Five Must-See DEF CON Talks Available Now on YouTube

Sep 11 by George V. Hulme

We can’t always make it to the conference, and when we do we can’t always get to see every talk we’d like to see. That’s one of the reasons why I like to shop around YouTube from time to time and look for talks I wish I’d seen in person.

Read More

Healthcare data breaches on the rise

Aug 21 by George V. Hulme

An analysis of healthcare data breaches for the first half of the year shows that the healthcare industry is on the path to suffer more one data breach a day this year.

Read More

Developers: business leadership doesn’t understand tech

Aug 17 by George V. Hulme

One doesn’t have to look far to see software is vulnerable, and who better to discuss the perceived state of software security than developers. With that in mind, Netsparker recently conducted a survey that looked at the views of developers on eactly this subject.

Read More

Following GAO Report Detailing IoT Security Risks, Legislatures Proffer Plan to Harden IoT Devices

Aug 09 by George V. Hulme

A bill introduced earlier this week in the United States Senate aims to bolster the security of Internet-connected devices by using the vast-purchasing power of the United States Government to enforce a baseline security standard.

Read More

Swedish scandalous cloud security leak

Jul 24 by George V. Hulme

A cybersecurity breach scandal involving the Swedish Transport Authority, Transportstyrelsen, erupted late last week and throughout the weekend according to numerous news reports.

Read More

GDPR Readiness: Time is Slipping By

Jul 24 by George V. Hulme

When it comes to attaining readiness for General Data Protection Regulation (GDPR) the clock is ticking. The GDPR is a set of regulatory mandates (Regulation (EU) 2016/679) that seek to shore up and streamline data protections for citizens within the European Union, including providing residents control over data about them and limiting exports of such data outside the union.

Read More

Cloud Security




Subscribe to Blog Updates

Latest Tweets