Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

How attackers exploit QR codes and how to mitigate the risk

11 top cloud security threats

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Egregious 11," the top security threats organizations face when using cloud services.

Securing the edge: 5 best practices

Securing the edge: 5 best practices

Considering how much is at stake in terms of data and infrastructure exposure, companies looking to take advantage of edge computing’s promise will need to take steps to mitigate the risks.

Career roadmap: cyber security engineer

Career roadmap: cyber security engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

8 things your security team needs to know about WPA3

8 things your security team needs to know about WPA3

All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.

A 10-point plan to vet SaaS provider security

A 10-point plan to vet SaaS provider security

Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.

6 ways to be more secure in the cloud

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

IT’s 10 biggest challenges amid COVID-19

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

6 common container security mistakes to avoid

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

A security guide for pandemic planning: 7 key steps

A security guide for pandemic planning: 7 key steps

Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas.

10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

Load More