Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

7 critical IT policies you should have in place

How one multicloud-based business manages security controls

How one multicloud-based business manages security controls

AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

How attackers exploit QR codes and how to mitigate the risk

How attackers exploit QR codes and how to mitigate the risk

Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

Securing the edge: 5 best practices

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

Career roadmap: cyber security engineer

Career roadmap: cyber security engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

8 things your security team needs to know about WPA3

8 things your security team needs to know about WPA3

All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.

A 10-point plan to vet SaaS provider security

A 10-point plan to vet SaaS provider security

Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.

6 ways to be more secure in the cloud

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

IT’s 10 biggest challenges amid COVID-19

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

6 common container security mistakes to avoid

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

Load More