Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

A security guide for pandemic planning: 7 key steps

10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

What it takes to become a CISO

What it takes to become a CISO

The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

 Can microsegmentation help IoT security?

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it.

How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

3 IAM deployment models: Which will work for your organization?

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

6 missteps that could cost CISOs their jobs

6 missteps that could cost CISOs their jobs

Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.

Five things you need to know about executive protection

Protecting executives today is about much more than physically shielding them from danger.

Five things you need to know about executive protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

Guide to the top college and university cyber security degree programs

Guide to the top college and university cyber security degree programs

CISOs and CSOs should be heartened by the fact that more colleges and universities are offering academic programs and degrees in cyber security specialties. They are also doing their best to place young professionals into the...

Load More