

Bob Violino
Contributing writer
Bob Violino is a freelance writer who covers a variety of technology and business topics.


8 things your security team needs to know about WPA3
All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.

A 10-point plan to vet SaaS provider security
Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.
6 ways to be more secure in the cloud
If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

IT’s 10 biggest challenges amid COVID-19
The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

6 common container security mistakes to avoid
Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

5 steps to building an effective disaster preparedness plan
Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

A security guide for pandemic planning: 7 key steps
Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas.

10 tough security interview questions, and how to answer them
Recently hired security leaders share what hiring execs want to know in interviews.

Career roadmap: CISO
The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.

Can microsegmentation help IoT security?
Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

How much should you spend on security?
Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it.
How to conduct a proper GDPR audit: 4 key steps
Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

3 IAM deployment models: Which will work for your organization?
Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

6 missteps that could cost CISOs their jobs
Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.

Five things you need to know about executive protection
Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

What it takes to be a security incident responder
A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

What it takes to be a malware analyst
The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response.

What it takes to be a security software developer
Developers with a security focus will be in strong demand, especially for financial, cloud and Internet of Things applications.

What it takes to be a security architect
While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.