George V. Hulme

For more than 20 years George V. Hulme has written about business, technology, and cybersecurity topics. He currently focuses on cybersecurity and digital innovation. Previously he was senior editor at InformationWeek, and has freelanced for many trade and general interest publications.

The rising security risk of the citizen developer

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

Tackling cybersecurity threat information sharing challenges

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

Q&A: Mobile app security should not be an afterthought

Q&A: Mobile app security should not be an afterthought

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more rapid development workflows. What does this mean for app security?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

Developers find themselves in hackers’ crosshairs

Developers find themselves in hackers’ crosshairs

Here’s what enterprises need to do in order to protect their development environments from attack.

Six entry-level cybersecurity job seeker failings

Six entry-level cybersecurity job seeker failings

Here's how many cybersecurity entry-level job seekers fail to make a great first impression.

Social engineering stories from the front lines

Social engineering stories from the front lines

Professional penetration testers share their real-world stories on how they hack the hearts and minds of enterprise employees.

Data Breaches Rise as Cybercriminals Continue to Outwit IT

Data Breaches Rise as Cybercriminals Continue to Outwit IT

Security breaches rise again this year, costing an average of $415,000, as security pros fail to keep pace with cybercrime innovation.

Pay up for talent? Is there a security salary disconnect?

Pay up for talent? Is there a security salary disconnect?

Demand for security pros has never been higher, so why are salaries flat?

Why our lack of understanding on China may be the biggest risk

While China’s ability to wage cyber warfare is sure, the real risk to the U.S. may be its lack of understanding the eastern nation.

Moving toward smart and secure continuous software delivery

Moving toward smart and secure continuous software delivery

Experts contend continuous software integration and delivery practices can boost secure coding practices.

Load More