George V. Hulme
Recent Posts
It’s Time Manufacturers Assemble a Sound Cybersecurity Effort
Recently the ISACA (Information Systems Audit and Control Association) and the Digital ...
The Impact of Quantum Computing on Cybersecurity
Earlier this year, Quantum computing took another big step out of the laboratory and toward ...
The Short (and Longer) Term Remaining Damage of the Government Closure on Cybersecurity
While the U.S. Federal government is running (for now) again, there remains a concern that ...
Can Security Teams Tame Today’s Cloud Complexity?
The promise was that cloud computing would simplify enterprise business-technology. ...
The API Security Essentials You Need to Know
In the modern enterprise, APIs are both the keys that unlockdata and the glue that makes ...
NIST Releases Guide to Better Manage Privileged Accounts
Privileged accounts are those accounts you most definitely never want to lose control over. ...
Managing and Securing Containers Just Got Easier
When it comes to securing a public cloud infrastructure, many organizations are under the ...
Healthcare Cybersecurity in Intensive Care
Despite regulatory mandates and years of costly data breaches in the healthcare industry, a ...
One-third of All Vulnerabilities Rated High Risk
First the good news: according to a published report there were more than 16,000 software ...
Think Your Organization Has a Healthy Cybersecurity Culture?
If your organization has a healthy cybersecurity culture, consider yourself lucky — less ...
DevSecOps: More Work Ahead
DevOps has come a long way since it got underway in full force nearly ten years ago. As was ...
AI Helps Enterprises Conquer IT Speed and Complexity
While many had hoped that along with the rise of cloud computing would come a more simple ...