

Bob Violino
Contributing writer
Bob Violino is a freelance writer who covers a variety of technology and business topics.

5 top hybrid cloud security challenges
Hybrid cloud environments can add complexity, reduce visibility, and require different logging and monitoring approaches for security teams.

5 IT risk assessment frameworks compared
Formal risk assessment methodologies can help take guesswork out of evaluating IT risks if applied appropriately. Here is real-world feedback on using COBIT, OCTAVE, FAIR, NIST RMF, and TARA.

7 deadly sins of Salesforce security
Your Salesforce system holds a lot of sensitive customer data. Don’t fall victim to one of these common sins, errors, and blindspots.

7 unexpected ransomware costs
Indirect costs related to a ransomware attack can add up over time. These are the expenses and financial risks that CISOs should be aware of.

7 tips for better CISO-CFO relationships
A successful CISO/CFO relationship will help ensure an organization has the right resources for its risk profile.

Google Cloud CISO Phil Venables on the future of cloud security
Can cloud providers help lift security's burden of endless compliance checklists and certifications?

7 critical IT policies you should have in place
Putting a framework of IT policies that should be the foundation of every company's security plan.

How one multicloud-based business manages security controls
AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

How attackers exploit QR codes and how to mitigate the risk
Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

11 top cloud security threats
More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

5 best practices for securing the edge
Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.