George V. Hulme

For more than 20 years George V. Hulme has written about business, technology, and cybersecurity topics. He currently focuses on cybersecurity and digital innovation. Previously he was senior editor at InformationWeek, and has freelanced for many trade and general interest publications.

Business transformation proves to be catalyst for cybersecurity spending

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right.

Is a board's involvement in cybersecurity really that critical?

Is a board's involvement in cybersecurity really that critical?

It’s often repeated that board involvement is crucial for cybersecurity success, but is this true?

Developers find themselves in hackers’ crosshairs

Developers find themselves in hackers’ crosshairs

Here’s what enterprises need to do in order to protect their development environments from attack.

CSO Survival Guide: Securing DevOps

CSO Survival Guide: Securing DevOps

A number of the most important stories you need to read for securing DevOps

Do boards of directors actually care about cybersecurity?

Do boards of directors actually care about cybersecurity?

There’s no shortage of arguments that cybersecurity needs to be aligned with the needs of the business, or that security is now a “boardroom issue.” And it seems that a new report or study is issued every day that states that boards...

Enterprise security spending less on skills, more on technology

Why are enterprises spending more on tools, and less on people? Good question.

Does DevOps hurt or help security?

Does DevOps hurt or help security?

Naysayers contend DevOps weakens security, others say DevOps enhances security.

Social engineering stories from the front lines

Social engineering stories from the front lines

Professional penetration testers share their real-world stories on how they hack the hearts and minds of enterprise employees.

The 2015 Social Engineering Survival Guide

The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it’s often easier to trick someone into opening an email and...

CSO's 2015 Mobile Security Survival Guide

Security risks and data breaches are growing while the form factors of computing devices shrink—because much enterprise data today is created and consumed on mobile devices. This clearly explains why mobile security persistently tops...

The 2015 social engineering survival guide

The 2015 social engineering survival guide

What you need to know to keep your enterprise secure from social engineering exploits.

Load More