Bob Violino

Contributing writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

Career roadmap: cybersecurity engineer

Career roadmap: cybersecurity engineer

As demand for highly skilled cyber security professionals increases, we talk to Anna Zapata, cyber security engineer at communications services provider AT&T to find out what it takes to become a cyber security engineer.

8 things your security team needs to know about WPA3

8 things your security team needs to know about WPA3

All new Wi-Fi devices must now be WPA3-certified, and this has implications for how you manage the security for wireless connections in both the office and for home-based employees.

A 10-point plan to vet SaaS provider security

A 10-point plan to vet SaaS provider security

Using a software-as-a-service provider means giving up some control over security, so close vetting of SaaS security during vendor evaluation is critical.

6 ways to be more secure in the cloud

If you rely on multiple or hybrid cloud environments to support business processes, you need to be as vigilant protecting data and applications as when they resided on premises.

IT’s 10 biggest challenges amid COVID-19

IT’s 10 biggest challenges amid COVID-19

The coronavirus pandemic has disrupted IT operations across nearly every industry. Here’s how IT leaders are rising to the challenges.

6 common container security mistakes to avoid

6 common container security mistakes to avoid

Containers are a secure way to deploy applications and services, but only if you use them properly. Here's how.

5 steps to building an effective disaster preparedness plan

5 steps to building an effective disaster preparedness plan

Disasters come in many forms, but they all create disruptions in the workforce, networks and partner ecosystem. Here's how CISOs can prepare security teams for the next one.

A security guide for pandemic planning: 7 key steps

A security guide for pandemic planning: 7 key steps

Every security operation should be asking whether they are prepared for a pandemic in the wake of the coronavirus (COVID-19) outbreak. Start by focusing on these areas.

10 tough security interview questions, and how to answer them

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

Career roadmap:  CISO

Career roadmap: CISO

The chief information security officer (CISO) role has been steadily rising in importance and visibility. CISOs now carry the burden of responsibility for securing some of a company’s most valuable resources.

 Can microsegmentation help IoT security?

Can microsegmentation help IoT security?

Deploying microsegmentation as part of a broad IoT security strategy can enable more granular control of network systems and better isolation if a security flaw is exploited.

How much should you spend on security?

How much should you spend on security?

Each organization needs to develop its own ongoing process for evaluating needs and justifying security spend. Here's how two CISOs do it.

How to conduct a proper GDPR audit: 4 key steps

Organizations subject to the EU's General Data Protection Regulation should do regular compliance audits. Here are the steps experts say you should take.

3 IAM deployment models: Which will work for your organization?

3 IAM deployment models: Which will work for your organization?

Each of the identity and access management platform deployment models--on-premises, cloud and hybrid--has trade-offs and different resource requirements.

6 missteps that could cost CISOs their jobs

6 missteps that could cost CISOs their jobs

Sure, a big preventable breach might easily cost a CISO his or her job. A few less obvious missteps could do the same.

Five things you need to know about executive protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

What it takes to be a security incident responder

What it takes to be a security incident responder

A wide range of technical skills and curiosity about the mechanics and goals of an attack are key for effective incidence response.

What it takes to be a malware analyst

What it takes to be a malware analyst

The proliferation of ransomware and other attacks has increased demand for experts who can analyze how the software works and devise a response.

What it takes to be a security software developer

What it takes to be a security software developer

Developers with a security focus will be in strong demand, especially for financial, cloud and Internet of Things applications.

What it takes to be a security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

Load More