George V. Hulme

Securing mobile health records remains a significant challenge

Securing mobile health records remains a significant challenge

Healthcare organizations are investing big into mobile medical records, but are they keeping them secure?

Mobile security Q&A: Securing the mobile minimum viable app

Mobile security Q&A: Securing the mobile minimum viable app

As enterprises struggle to keep up with their internal demand for mobile apps, more are turning to more rapid development workflows. What does this mean for app security?

The CSO IoT Survival Guide

The CSO IoT Survival Guide

As the world of the connected everything approaches, CISOs need to know how to keep all of their enterprise IoT devices, as well as the data they generate, secure

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

6 reasons why boards of director must be engaged in cybersecurity

6 reasons why boards of director must be engaged in cybersecurity

When one thinks of systematic risks to a large enterprise, cyber attacks and data breaches don’t usually top the list; such things as black swan events, natural disasters, poor business execution, and credit worries usually do. But...

Is the board's involvement in cybersecurity really that critical?

Is the board's involvement in cybersecurity really that critical?

It’s often repeated that board involvement is crucial for cybersecurity success, but is this true?

Top executives and cybersecurity: a fickle relationship?

Top executives and cybersecurity: a fickle relationship?

CISOs have more attention of top business execs now than ever before; is it here to stay?

Survey says enterprises are stepping up their security game

Survey says enterprises are stepping up their security game

To fight threats today, more enterprises are increasing their information security spending, collaborating more on threat intelligence efforts, and they also turning to cybersecurity insurance policies in larger numbers.

Developers find themselves in hackers’ crosshairs

Developers find themselves in hackers’ crosshairs

Here’s what enterprises need to do in order to protect their development environments from attack.

CSO Survival Guide: Securing DevOps

CSO Survival Guide: Securing DevOps

A number of the most important stories you need to read for securing DevOps

Do boards of directors actually care about cybersecurity?

Do boards of directors actually care about cybersecurity?

There’s no shortage of arguments that cybersecurity needs to be aligned with the needs of the business, or that security is now a “boardroom issue.” And it seems that a new report or study is issued every day that states that boards...

Security industry reacts to Oracle’s CSO missive

Security industry reacts to Oracle’s CSO missive

Reactions to the controversial post diverse and emotional.

Enterprise security spending less on skills, more on technology

Enterprise security spending less on skills, more on technology

Why are enterprises spending more on tools, and less on people? Good question.

2015 State of Cybercrime: Enterprise fight is stuck in stall

2015 State of Cybercrime: Enterprise fight is stuck in stall

The 2015 Cybercrime story primary feature

CSO’s CISO Executive Career and Leadership Success Guide

CSO’s CISO Executive Career and Leadership Success Guide

What CISOs need to know to adapt and succeed.

Does DevOps hurt or help security?

Does DevOps hurt or help security?

Naysayers contend DevOps weakens security, others say DevOps enhances security.

Cloud Security Alliance highlights cloud security momentum and IoT security

Cloud Security Alliance highlights cloud security momentum and IoT security

Cloud Security Alliance highlights cloud security Momentum and IoT security

The CSO Security Career Survival Guide

The CSO Security Career Survival Guide

CSO's Security Career Survival Guide

6 Entry-Level Cybersecurity Job Seeker Failings

6 Entry-Level Cybersecurity Job Seeker Failings

Here's how many cybersecurity entry-level job seekers fail to make a great first impression.

Social Engineering Stories From the Front Lines

Social Engineering Stories From the Front Lines

Professional penetration testers share their real-world stories on how they hack the hearts and minds of enterprise employees.

Load More