

Bob Violino
Contributing writer
Bob Violino is a freelance writer who covers a variety of technology and business topics.

7 top challenges of security tool integration
With organizations using as many as 100 security tools, getting them to work well together is an ongoing battle. These are the most common pitfalls of security tool integration.

5 top hybrid cloud security challenges
Hybrid cloud environments can add complexity, reduce visibility, and require different logging and monitoring approaches for security teams.

5 IT risk assessment frameworks compared
Formal risk assessment methodologies can help take guesswork out of evaluating IT risks if applied appropriately. Here is real-world feedback on using COBIT, OCTAVE, FAIR, NIST RMF, and TARA.

7 deadly sins of Salesforce security
Your Salesforce system holds a lot of sensitive customer data. Don’t fall victim to one of these common sins, errors, and blindspots.

7 unexpected ransomware costs
Indirect costs related to a ransomware attack can add up over time. These are the expenses and financial risks that CISOs should be aware of.

7 tips for better CISO-CFO relationships
A successful CISO/CFO relationship will help ensure an organization has the right resources for its risk profile.

Google Cloud CISO Phil Venables on the future of cloud security
Can cloud providers help lift security's burden of endless compliance checklists and certifications?

7 critical IT policies you should have in place
Putting a framework of IT policies that should be the foundation of every company's security plan.

How one multicloud-based business manages security controls
AppsFlyer processes 80 terabytes of data a day across multiple cloud hosting services. It scales its security needs by keeping a close eye on identity governance and access controls.

How attackers exploit QR codes and how to mitigate the risk
Attackers are taking advantage of the increased use of QR codes to steal sensitive information or conduct phishing campaigns. Here's what security teams and employees need to know.

5 best practices for securing the edge
Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.