Bob Violino

Contributing writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

5 key considerations for your 2023 cybersecurity budget planning

7 top challenges of security tool integration

7 top challenges of security tool integration

With organizations using as many as 100 security tools, getting them to work well together is an ongoing battle. These are the most common pitfalls of security tool integration.

5 top hybrid cloud security challenges

5 top hybrid cloud security challenges

Hybrid cloud environments can add complexity, reduce visibility, and require different logging and monitoring approaches for security teams.

5 IT risk assessment frameworks compared

5 IT risk assessment frameworks compared

Formal risk assessment methodologies can help take guesswork out of evaluating IT risks if applied appropriately. Here is real-world feedback on using COBIT, OCTAVE, FAIR, NIST RMF, and TARA.

7 deadly sins of Salesforce security

7 deadly sins of Salesforce security

Your Salesforce system holds a lot of sensitive customer data. Don’t fall victim to one of these common sins, errors, and blindspots.

7 unexpected ransomware costs

7 unexpected ransomware costs

Indirect costs related to a ransomware attack can add up over time. These are the expenses and financial risks that CISOs should be aware of.

7 tips for better CISO-CFO relationships

7 tips for better CISO-CFO relationships

A successful CISO/CFO relationship will help ensure an organization has the right resources for its risk profile.

Google Cloud CISO Phil Venables on the future of cloud security

Google Cloud CISO Phil Venables on the future of cloud security

Can cloud providers help lift security's burden of endless compliance checklists and certifications?

7 critical IT policies you should have in place

7 critical IT policies you should have in place

Putting a framework of IT policies that should be the foundation of every company's security plan.

How one multicloud-based business manages security controls

How one multicloud-based business manages security controls

AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

How attackers exploit QR codes and how to mitigate the risk

How attackers exploit QR codes and how to mitigate the risk

Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

5 best practices for securing the edge

5 best practices for securing the edge

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

Load More