George V. Hulme

For more than 20 years George V. Hulme has written about business, technology, and cybersecurity topics. He currently focuses on cybersecurity and digital innovation. Previously he was senior editor at InformationWeek, and has freelanced for many trade and general interest publications.

The rising security risk of the citizen developer

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

Tackling cybersecurity threat information sharing challenges

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

Q&A: Mobile app security should not be an afterthought

Q&A: Mobile app security should not be an afterthought

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more rapid development workflows. What does this mean for app security?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

Developers find themselves in hackers’ crosshairs

Developers find themselves in hackers’ crosshairs

Here’s what enterprises need to do in order to protect their development environments from attack.

Six entry-level cybersecurity job seeker failings

Six entry-level cybersecurity job seeker failings

Here's how many cybersecurity entry-level job seekers fail to make a great first impression.

Data Breaches Rise as Cybercriminals Continue to Outwit IT

Data Breaches Rise as Cybercriminals Continue to Outwit IT

Security breaches rise again this year, costing an average of $415,000, as security pros fail to keep pace with cybercrime innovation.

Pay up for talent? Is there a security salary disconnect?

Pay up for talent? Is there a security salary disconnect?

Demand for security pros has never been higher, so why are salaries flat?

Black Hat 2014: The challenge of securing embedded devices and IoT on display

Black Hat 2014: The challenge of securing embedded devices and IoT on display

Industry doesn’t yet fully realize extent of subversion possible through IoT security, researchers say.

Securing big data off to slow start

Securing big data off to slow start

While big data implementations have taken off, the work needed to secure these systems has not.

The U.S. state of cybercrime takes another step back

The U.S. state of cybercrime takes another step back

When it comes to cybercrime, it seems no enterprise goes unscathed. There are more breaches happening, the associated costs are rising, and business leadership grows increasingly concerned that information security remains a challenge...

Load More