Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

6 ways to be more secure in the cloud

IT’s 10 biggest challenges amid COVID-19

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

6 common container security mistakes to avoid

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

A security guide for pandemic planning: 7 key steps

A security guide for pandemic planning: 7 key steps

Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas.

10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

Career roadmap:  CISO

Career roadmap: CISO

The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Treacherous 12," the top security threats organizations face when using cloud services.

 Can microsegmentation help IoT security?

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it.

How to conduct a proper GDPR audit: 4 key steps

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

3 IAM deployment models: Which will work for your organization?

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

Load More