George V. Hulme
George V. Hulme
HHS Urges FDA to Do More on Medical Device Security
We’ve been writing for a few years now about the dangers of connected medical devices and how the U.S. F.D.A. has sought to increase the security of these devices. Previously, in St. Jude Takes Steps to Secure Vulnerable Medical Implants we covered the security surrounding St. Jude medical devices. We ... Read More
Secretary of Homeland Security: We’re Ready for Election Day Interference
About a month ahead of the midterm elections, the Washington Post’s cybersecurity reporter Derek Hawkins interviewed Kirstjen Nielsen, United States Secretary of Homeland Security, about the current state of the nation’s election security. The interview took place during the Washington Post’s Cybersecurity Summit | 2018. When asked how the security ... Read More
Security Boulevard
As Bots and Robotic Processes Rise in the Enterprise, so Do Security Risks
As business-technology systems grow more complex, so does the need to automate essential management and security processes. With hybrid cloud architectures, DevOps management approaches, and continuous software delivery pipelines, organizations need to automate as many processes as they can automate. For those tasks that require little or no deviation, many ... Read More
Application Security and DevOps: Q&A with Author Kenneth Van Wyk
Application security is one of the most important topics in information security, and few know the subject better than Kenneth Van Wyk. He has been a career IT security expert for more than 30 years and specializes in both incident response and software security. Van Wyk has authored two popular ... Read More
Security Boulevard
Study Finds Mobile Fraud, Threats Soar
When asked by a reporter why he robbed banks, American bank robber Willie Sutton reportedly answered, “Because that’s where the money is.” While there is some controversy as to whether he actually made the statement, it’s a truism nonetheless and there’s even a diagnosis law named after the famous quote ... Read More
Security Boulevard
Enterprises Still Struggle to Put the Sec in DevOps
Despite it being considered an essential practice, most organizations still find it difficult implementing security into their DevOps efforts. It’s not that they don’t want to, they say they do, it’s that they just haven’t provided their developers the tools, processes, or even training to get it done. These are ... Read More
Data Breach Notification Laws: Is it Time for a Uniform Standard?
State data breach notification laws had two primary aims in mind. The first was to potentially embarrass organizations to improve their data security by forcing them to disclose certain data breaches publicly. The second was to help consumers have a fighting chance against identity theft by arming them with the ... Read More
Security Boulevard
A Real-world Deep Dive into the Top Cloud Threats
For years now, the cloud computing alliance has been working to identify the top threats to cloud computing. In 2012 they published a survey that identified the top threats to cloud at the time, and two years ago they published The Treacherous 12 Cloud Computing Top Threats in 2016. That ... Read More
Researchers Find Power Grid, IoT Device Security a Dangerous Mix
Smart connected appliances, should they be commandeered by attackers for use in a botnet, could result in everything from local power outages to severe wide-scale blackouts a team of Princeton University researchers contended at the USENIX Security Symposium ... Read More
Analysis of Web Apps Reveals Current Top Security Threats
Thirty-four days. That’s how long it takes for the average organization to patch a high-severity web application vulnerability according to a study of more than 316 million security incidents released recently by web application security provider tCell. The report, “Security Report for In-Production Web Applications,” analyzed real-world cloud-based web application ... Read More
Security Boulevard