George V. Hulme

DDoS explained: How distributed denial of service attacks are evolving

DDoS protection, mitigation and defense: 8 essential tips

DDoS protection, mitigation and defense: 8 essential tips

Protecting your network from DDoS attacks starts with planning your response. Here, security experts offer their best advice for fighting back.

6 DoS attacks that made headlines

6 DoS attacks that made headlines

As times have changed, so have these venerable attacks.

Black Hat and DEF CON: The evolution of Hacker Summer Camp

Black Hat and DEF CON: The evolution of Hacker Summer Camp

It’s been 20 years since the first Black Hat Briefings conference. How has this staple of the cybersecurity industry changed over the years?

Unmanaged, orphaned SSH keys remain a serious enterprise risk

Unmanaged, orphaned SSH keys remain a serious enterprise risk

There are many ways attackers can try to infiltrate an enterprise, but many times enterprises make it so easy that the attackers don’t have to try too hard. Consider the current state of orphan SSH (Secure Shell) keys and how...

The rising security risk of the citizen developer

The rising security risk of the citizen developer

Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security?

What makes a good application pen test? Metrics

What makes a good application pen test? Metrics

Research from application security crowd testing and bug bounty program provider Cobalt attempts to define what enterprises could measure to improve results

Business transformation proves to be a catalyst for cybersecurity spending

Business transformation proves to be a catalyst for cybersecurity spending

Evolving risks and business technologies shift focus in security budgets

9 biases killing your security program

9 biases killing your security program

Here’s a (by no means all-inclusive) list of nine such cognitive biases that security professionals should especially remain aware.

So you want to be a security researcher?

So you want to be a security researcher?

Ever consider conducting your own security research but didn’t know where to start? DataGravity CISO Andrew Hay has some advice for you.

Securing mobile health records remains a significant challenge

Securing mobile health records remains a significant challenge

Healthcare organizations are investing big into mobile medical records, but are they keeping them secure?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to cloud security which is better? Heavy hand or gentle policing?

When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others try to learn what their employees...

Load More