Bob Violino

Contributing writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

5 top hybrid cloud security challenges

5 IT risk assessment frameworks compared

5 IT risk assessment frameworks compared

Formal risk assessment methodologies can help take guesswork out of evaluating IT risks if applied appropriately. Here is real-world feedback on using COBIT, OCTAVE, FAIR, NIST RMF, and TARA.

7 deadly sins of Salesforce security

7 deadly sins of Salesforce security

Your Salesforce system holds a lot of sensitive customer data. Don’t fall victim to one of these common sins, errors, and blindspots.

7 unexpected ransomware costs

7 unexpected ransomware costs

Indirect costs related to a ransomware attack can add up over time. These are the expenses and financial risks that CISOs should be aware of.

7 tips for better CISO-CFO relationships

7 tips for better CISO-CFO relationships

A successful CISO/CFO relationship will help ensure an organization has the right resources for its risk profile.

Google Cloud CISO Phil Venables on the future of cloud security

Google Cloud CISO Phil Venables on the future of cloud security

Can cloud providers help lift security's burden of endless compliance checklists and certifications?

7 critical IT policies you should have in place

7 critical IT policies you should have in place

Putting a framework of IT policies that should be the foundation of every company's security plan.

How one multicloud-based business manages security controls

How one multicloud-based business manages security controls

AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

How attackers exploit QR codes and how to mitigate the risk

How attackers exploit QR codes and how to mitigate the risk

Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

5 best practices for securing the edge

5 best practices for securing the edge

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

Career roadmap: cyber security engineer

Career roadmap: cyber security engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

Load More