Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

3 IAM deployment models: Which will work for your organization?

How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

The dirty dozen: 12 top cloud security threats for 2018

The dirty dozen: 12 top cloud security threats for 2018

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

6 missteps that could cost CISOs their jobs

6 missteps that could cost CISOs their jobs

Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.

Five things you need to know about executive protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

Guide to the top college and university cyber security degree programs

Guide to the top college and university cyber security degree programs

CISOs and CSOs should be heartened by the fact that more colleges and universities are offering academic programs and degrees in cyber security specialties. They are also doing their best to place young professionals into the...

10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

What it takes to be a security incident responder

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

What it takes to be a malware analyst

What it takes to be a malware analyst

The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response.

What it takes to be a security software developer

What it takes to be a security software developer

Developers with a security focus will be in strong demand, especially for financial, cloud and Internet of Things applications.

What it takes to be a security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

What it takes to be a security consultant

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services.

Load More