George V. Hulme

The rising security risk of the citizen developer

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

The 10 essential Reddits for security pros

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for.

7 (more) security TED Talks you can’t miss

7 (more) security TED Talks you can’t miss

In this selection you’ll find speakers taking on some of the most pressing, and persistent, security and privacy challenges of our time, from how society can fight the war on terror while maintaining the social values we cherish to...

Tackling cybersecurity threat information sharing challenges

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

How to avoid burnout

How to avoid burnout

After a while the pressures take their toll, and many security professionals burnout, or choose to change careers before that happens. To help you avoid that fate, we’ve assembled seven strategies every CISO should consider.

10 security Ted Talks you can’t miss

10 security Ted Talks you can’t miss

A slideshow of 10 interesting TED talks

Q&A: Mobile app security should not be an afterthought

Q&A: Mobile app security should not be an afterthought

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more rapid development workflows. What does this mean for app security?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

Six reasons why boards of director must be engaged in cybersecurity

Six reasons why boards of director must be engaged in cybersecurity

When one thinks of systematic risks to a large enterprise, cyber attacks and data breaches don’t usually top the list; such things as black swan events, natural disasters, poor business execution, and credit worries usually do. But...

Developers find themselves in hackers’ crosshairs

Developers find themselves in hackers’ crosshairs

Here’s what enterprises need to do in order to protect their development environments from attack.

Six entry-level cybersecurity job seeker failings

Six entry-level cybersecurity job seeker failings

Here's how many cybersecurity entry-level job seekers fail to make a great first impression.

Load More