George V. Hulme

7 (more) security TED Talks you can’t miss

Business transformation proves to be catalyst for cybersecurity spending

Business transformation proves to be catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

7 strategies to avoid CSO burnout

7 strategies to avoid CSO burnout

After a while the pressures take their toll, and many security professionals burn out, or choose to change careers. To help you avoid that fate, we’ve assembled seven strategies every manager should consider.

CSO Threat Intelligence Survival Guide

If enterprises want to understand how they can better invest in security defenses, build the necessary processes to respond to attacks, and mitigate the risks of a breach they need to get threat intelligence right.

Is a board's involvement in cybersecurity really that critical?

Is a board's involvement in cybersecurity really that critical?

It’s often repeated that board involvement is crucial for cybersecurity success, but is this true?

6 reasons why boards of directors must be engaged in cybersecurity

6 reasons why boards of directors must be engaged in cybersecurity

When one thinks of systematic risks to a large enterprise, cyber attacks and data breaches don’t usually top the list; such things as black swan events, natural disasters, poor business execution, and credit worries usually do. But...

Do boards of directors actually care about cybersecurity?

Do boards of directors actually care about cybersecurity?

There’s no shortage of arguments that cybersecurity needs to be aligned with the needs of the business, or that security is now a “boardroom issue.” And it seems that a new report or study is issued every day that states that boards...

The 2015 Social Engineering Survival Guide

The 2015 Social Engineering Survival Guide

Despite being an integral aspect of many, if not most, major attacks, social engineering tactics always seem to go underappreciated by enterprise security teams. However, it’s often easier to trick someone into opening an email and...

CSO's 2015 Mobile Security Survival Guide

CSO's 2015 Mobile Security Survival Guide

Security risks and data breaches are growing while the form factors of computing devices shrink—because much enterprise data today is created and consumed on mobile devices. This clearly explains why mobile security persistently tops...

CSO's incident response survival guide
Tip

CSO's incident response survival guide

Everything you you need to know to plan, detect and successfully respond to data breaches.

The challenge of securing embedded devices and IoT on display

Every year the numbers and the types of devices security professionals find themselves having to secure from attacks keep growing, and there's certainly no sign of that letting up at Black Hat 2014 this year.

Securing big data off to slow start

While so-called "big data" initiatives are not new to a number of industries a such as large financial services firms, pharmaceuticals, and large cloud companies a it is new to most organizations. And the low cost and ease of access...

Load More