Profile of George V. Hulme
News & Commentary Posts: 436
An award winning writer and journalist, for more than 20 years George Hulme has written about business, technology, and IT security topics. He currently freelances for a wide range of publications, and is security blogger at InformationWeek.com.
Articles by George V. Hulme
4/14/2011
Security capabilities shouldn't need to be bolted onto the mobile operating system, but unfortunately we're headed down the same painful path with smartphones and tablets that we took with desktops and notebooks.
1/31/2010
Dentists, physicians, and veterinarians are asking the Federal Trade Commission to exclude healthcare professionals from regulations designed to mitigate the risks of identity theft. I say: Step up and protect your customers from identity theft.
5/6/2005
Company deployed a suite of supply-chain and E-commerce applications to cut inventory costs and improve customer service.
4/29/2005
Pacific Alliance is installing TradeStone Software's Web-based apps to better automate the highly collaborative garment-buying and manufacturing process.
4/26/2005
Auto-parts retailer replaces paper forms with a system that scans bar codes and uses digital photos to provide proof of delivery.
4/22/2005
Manufacturing companies that deployed technology to improve their supply chains and other business processes showed the greatest gains in sales, according to a research report coming out next week.
4/22/2005
Package-delivery company is retooling its wireless infrastructure to improve business processes and customer service.
4/15/2005
In what is described as the largest telematics deal in history, IBM engineers will design an automobile-monitoring system and install a device in cars to track drivers in the United Arab Emirates.
4/7/2005
The developer of business-rules-management software introduces an application to help businesses and shippers make better decisions when selecting carriers and making schedules.
4/6/2005
Marine terminal operator SSA Marine is testing a new cargo-container tracking system to more accurately track shipping containers as they move through ports.
3/29/2005
Joe Cowan believes the troubled supply-chain software vendor will have a brighter future by focusing on vertical markets that have historically proven successful for the company.
3/25/2005
Michael McGrath, the new leader of the supply-chain software vendor, says customers expect faster benefits from major initiatives.
3/24/2005
A survey by AMR Research shows that while only 30% of manufacturing companies have deployed software for product-life-cycle management, another 25% are implementing or evaluating PLM software this year.
3/17/2005
Company upgrades Web site to better serve its global network of dealers.
3/4/2005
Thompson and Bloom work to convince customers it's the right thing to do
3/2/2005
The CEOs combine efforts to win shareholder backing and reassure wary customers. In an interview with InformationWeek, the executives explain how their product lines will work together to make life easier and safer for users.
2/16/2005
Authentica, Liquid Machines, and Microsoft were among the companies offering new or enhanced versions of DRM software.
2/15/2005
Two security vendors this week announced new tokens, which are small pieces of hardware that users often carry on keychains to gain access to computers, often through a USB port.
2/11/2005
'Enterprises need a single, converged product that provides antivirus, anti-spam, personal firewall, and personal intrusion prevention,' Gartner analyst MacDonald says.
2/4/2005
Microsoft refutes Russian company's claim, yet will continue to research it
2/4/2005
Security program focuses on collaboration and goes beyond advanced notification
2/1/2005
Thirty-nine percent of all complaints filed in 2004 were related to identity theft, which is a 1% decline from 2003, according to a newly released FTC report.
2/1/2005
Company deploys Mirage Networks' CounterPoint appliance to look for malicious activity across the network.
1/27/2005
The company posted $83.2 million in revenue for its fourth-quarter ended Dec. 31, up from $70.7 million reported in the year-ago period.
1/27/2005
The CEO of the largest vendor of computer security tokens gives his prognosis for what's going to matter in '05.
1/25/2005
Security for its 515 nationwide weight-control centers was being managed remotely, resulting in excessive IT maintenance and a lack of visibility.
1/20/2005
The acquisition is the latest in a consolidating managed security-services market.
1/19/2005
Quarterly revenue grew more than 40%, as Symantec executives vowed to both partner with and compete against Microsoft.
1/12/2005
Cummings sold the passwords and codes needed to access consumer credit reports, resulting in up to $100 million in losses for his victims.
1/11/2005
Lasco.A can spread through shared programs or through Bluetooth connectivity.
1/7/2005
Vendor plans release of virus- and worm-cleaning tool, as well
1/6/2005
Microsoft also will release a new malicious-software-removal tool next week.
12/31/2004
The Downloader.GK Trojan infects Web surfers who unknowingly visit Web sites that were maliciously designed to spread the application.
12/29/2004
Enhanced versions of the Cabir cell-phone worm, potentially more destructive than the original, have surfaced, though no cell phones have yet been infected.
12/17/2004
Deal gives Symantec product offerings that reach from PCs to company data centers
12/10/2004
Outside security researchers say Windows Service Pack 2 has security vulnerabilities, but no confirmation from Microsoft.
12/8/2004
Columbus Regional Healthcare System protects staff's wireless devices to ensure secure access to electronic medical records.
12/3/2004
11/24/2004
Attacks take advantage of unpatched flaw in Internet Explorer 6.0
11/22/2004
Survey by Intelligent Decisions indicates that patch management leaves less time for chief information security officers to work on improving overall security.
11/18/2004
Secure Office 2.0 simplifies the process of securing electronic documents.
11/18/2004
Oracle's new quarterly security-patch schedule departs from its monthly schedule, which Microsoft also uses.
11/18/2004
Pet-products retailer agrees to settle charges that flaws in its Web site violated security and privacy promises made to customers.
11/16/2004
AirTight gets funding to launch wireless-LAN firewall, and Air Defense will role out security software.
11/5/2004
Reports of glitches increase calls for paper-trail technology and other safeguards.
11/4/2004
The software maker will provide a summary of planned security bulletins three days in advance.
11/3/2004
Relatively few glitches have been reported with the direct-recording electronic-voting systems used in Tuesday's election.
11/2/2004
New software helps security managers monitor IT network usage and defend against external attacks.
10/6/2004
CA's $430 million acquisition of the ID-management software vendor is part of a push to strengthen its security product offerings.
10/5/2004
Some experts doubt whether the California law will have much impact on illegal spyware activity.
10/4/2004
Attacks against Web-services applications are expected to increase, analysts warn, and network security managers may not be prepared.
10/1/2004
Yoran helped form US-CERT, the government's cybersecurity information clearing house, but was reportedly frustrated with his post's limited authority and budgets.
10/1/2004
The department must do more to lower the risk of cyberattacks against its IT systems and networks, an internal report says.
9/28/2004
A specialized firewall is deployed to batten down the company's service-oriented architecture.
9/28/2004
Some feel a more-sophisticated virus is nearing completion.
9/27/2004
With compliance and security issues high on IT management's priority list, LogLogic and MX Logic attract the attention of venture capitalists.
9/24/2004
Cybertrust will sell public key infrastructure technology and services
9/20/2004
Study shows increase in profit-motivated attacks, while overall daily attack volume declines.
9/10/2004
Technology can help fight the growing cyberextortion threat, but experts say not enough companies are prepared
9/1/2004
On another quiet late-summer day, investors ignored some bad economic news.
8/13/2004
The key indexes closed the week with small gains, though record-high oil prices dampened enthusiasm among investors.
8/10/2004
Rate hikes often put stock buyers off, but in this case, it seems they like the message that it sent: The Fed thinks the recovery will continue.
8/10/2004
Its regular monthly security update patches a "moderate" flaw in Outlook Web Access for Microsoft Exchange Server 5.5.
8/5/2004
The malicious code will let an attacker gain control of the handheld device.
8/3/2004
The maker of the open-source Firefox Web browser will pay $500 to those who discover and report significant security bugs.
8/3/2004
The maker of the open-source Firefox Web browser will pay $500 to those who discover and report significant security bugs.
8/2/2004
Good news from the manufacturing sector offset renewed warnings of terrorist attacks in some key financial facilities.
7/30/2004
Hackers use 'bot' or 'zombie' apps to disrupt service for DoubleClick customers
7/30/2004
The patch, deemed "critical" by Microsoft, fixes three publicly disclosed vulnerabilities as well as many previously fixed Internet Explorer security holes to date.
7/29/2004
The company says Real may violate federal law with software that lets customers play their songs on a variety of devices.
7/27/2004
A better-than-expected consumer-confidence index as well as a good earnings report from Verizon seemed to soothe recent investor terrorism jitters.
7/27/2004
The second phase of the attack is planting a tool to launch a denial-of-service attack against the software maker.
7/26/2004
Missing storage devices prompt security clampdown.
7/16/2004
Software vendor releases security patches, a tool, and a network-access plan
7/16/2004
The amount of prison time for using someone else's identity is increased.
7/15/2004
The 'homeless' hacker gets sentenced to six months' home detention and two years' probation by a federal judge.
7/15/2004
Selling corporate secrets is 'tricky,' the site says, so it's 'redesigning' its business model.
7/13/2004
The holes affect various Microsoft operating system versions and apps ranging from Internet Explorer 6 SP1 to Windows Server 2003 Gold.
7/13/2004
There was little movement in the markets as investors sat on the sidelines waiting for Intel's 2Q financials after the bell.
7/12/2004
The acquisition, valued at just under $300 million, would be CyberGuard's fourth in about a year.
7/8/2004
More than 100 Web sites infected two weeks ago with malicious code still haven't cleaned up their servers, a security research report says.
7/8/2004
A coalition of voting-reform and civil-rights groups in Florida filed suit to overturn the state's rule that manual recounts are prohibited on touch-screen voting systems.
7/6/2004
The InformationWeek 100 fell a whopping 3.6%, and the Nasdaq Composite was down 2.2%.
7/2/2004
The "configuration change" closes a loophole that had allowed hackers to convert popular Web sites into virus transmitters.
6/30/2004
Malicious Web sites can use the flaw to spoof content from a trusted Web site.
6/29/2004
The Conference Board's consumer confidence index rose much more than expected in June, sending stocks higher as investors await Wednesday's Fed meeting.
6/25/2004
Hacked Web sites are infecting PCs with Trojan horses and keystroke loggers
6/25/2004
A major Internet attack that installs hacker tools on users' systems is subsiding, security experts say. But more copycat attacks are possible in the days ahead.
6/25/2004
Security experts say Russian hackers are using a sophisticated attack to compromise major E-commerce Web sites, which then infect visitors with hacker tools designed to steal passwords and financial data, and possibly spew spam.
6/16/2004
According to the Taipei Times, a cabinet minister says government officials believe Chinese hackers have tapped into databases belonging to the Democratic Progressive Party and stolen classified information.
6/16/2004
Federal authorities are investigating the attack, which focused on Akamai's Domain Name Service, resulting in delays as users tried to access the sites.
6/15/2004
The markets perked up after the core Consumer Price Index fell within expectations and Fed chairman Alan Greenspan said inflation isn't a short-term threat.
6/15/2004
Russian antivirus firm Kaspersky Labs says the worm, named Cabir, infects mobile phones running the Symbian operating system.
6/7/2004
6/2/2004
Blue chips rose on news that oil prices could fall. But tech stocks slipped ahead of Intel's quarterly forecast later this week.
6/1/2004
Tech stocks proved the day's overall losers. Our InformationWeek 100 fell half a point.
5/27/2004
Stocks rallied after the Commerce Department issued an upward revision of the first-quarter gross domestic product.
5/24/2004
5/24/2004
5/24/2004