George V. Hulme

For more than 20 years George V. Hulme has written about business, technology, and cybersecurity topics. He currently focuses on cybersecurity and digital innovation. Previously he was senior editor at InformationWeek, and has freelanced for many trade and general interest publications.

6 top vulnerability management tools and how they help prioritize threats

23 DevSecOps tools for baking security into the development process

23 DevSecOps tools for baking security into the development process

Catch and remediate application vulnerabilities earlier and help integrate security in the the development process with these five categories of DevSecOps tools.

DDoS protection, mitigation and defense: 8 essential tips

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

6 DoS attacks that made headlines

6 DoS attacks that made headlines

As times have changed, so have these venerable attacks.

Black Hat and DEF CON: The evolution of Hacker Summer Camp

Black Hat and DEF CON: The evolution of Hacker Summer Camp

It’s been 20 years since the first Black Hat Briefings conference. How has this staple of the cybersecurity industry changed over the years?

Six entry-level cybersecurity job seeker failings

Six entry-level cybersecurity job seeker failings

More cybersecurity job openings mean more entry-level candidates are entering the market. These are the common mistakes they make when apply and interviewing for an opening.

Crowdsourcing application security closes the automated assessment gap

Crowdsourcing application security closes the automated assessment gap

Crowdsourced pen tests aren't for everyone, but for one SaaS provider they help identify software flaws that automated tools may miss.

Unmanaged, orphaned SSH keys remain a serious enterprise risk

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

The rising security risk of the citizen developer

The rising security risk of the citizen developer

Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security?

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

The 10 essential Reddits for security pros

The 10 essential Reddits for security pros

Here, we’ve gathered 10 of the best cybersecurity Reddits so you don’t have to waste any time and can get straight to what you are looking for.

Tackling cybersecurity threat information sharing challenges

Tackling cybersecurity threat information sharing challenges

What are the lessons learned and recommended practices for forming new information sharing organizations? That’s where the newly formed International Association of Certified ISAOs (IACI) comes in. IACI CEO Michael Echols explains.

Enterprises continue to struggle to find cybersecurity talent, survey finds

Enterprises continue to struggle to find cybersecurity talent, survey finds

More enterprises continue to turn to managed security services providers to close the gap

Business transformation proves to be a catalyst for cybersecurity spending

Business transformation proves to be a catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

9 biases killing your security program

9 biases killing your security program

Here’s a (by no means all-inclusive) list of nine such cognitive biases that security professionals should especially remain aware.

7 strategies to avoid CSO burnout

7 strategies to avoid CSO burnout

After a while the pressures take their toll, and many security professionals burnout, or choose to change careers before that happens. To help you avoid that fate, we’ve assembled seven strategies every CISO should consider.

So you want to be a security researcher?

So you want to be a security researcher?

Ever consider conducting your own security research but didn’t know where to start? DataGravity CISO Andrew Hay has some advice for you.

The CSO 2016 Security Data Analytics Survival Guide

The CSO 2016 Security Data Analytics Survival Guide

What you need to know about how analytics are changing cybersecurity

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right.

Securing mobile health records remains a significant challenge

Securing mobile health records remains a significant challenge

Healthcare organizations are investing big into mobile medical records, but are they keeping them secure?

Load More