Pete Bartolik

Pete Bartolik has researched and written about technology and vertical market segments for many years and has worked on many market research, writing and social media projects. He was news editor of the IT management publication, Computerworld, and a reporter for a daily newspaper.

Piracy Attacks Both the Revenue and Security of Media Companies and their Viewers

Vigilance and Planning: Experts Share Their IT and Data Security Strategies

Vigilance and Planning: Experts Share Their IT and Data Security Strategies

IT and security leaderstake proactive approaches to secure and protect IT environments amid the evolving threat landscape.

Financial Services Malware Just Won’t Die. What to Do About It.

Financial Services Malware Just Won’t Die. What to Do About It.

Emotet, described as among the most dangerous types of malware for financial services organizations, has returned.

How the Gaming Industry Can Play it Safe and Not Get Pwned

How the Gaming Industry Can Play it Safe and Not Get Pwned

Innovations by both gaming providers and cybercriminals have created new security obstacles to overcome.

DevSecOps and SDLC: Where Are We, and Where Should We Be?

DevSecOps and SDLC: Where Are We, and Where Should We Be?

Many organizations that have begun the effort to implement DevSecOps often quickly realize that they’re still in early stages of fully integrating security and compliance into the software development life cycle (SDLC). Today,...

Improving Software Supply Chain Security with DevSecOps

Improving Software Supply Chain Security with DevSecOps

Over the past year, there have been several high-profile incidents in which attackers have attempted to compromise enterprises through the software supply chain. A software supply chain “is anything that goes into or affects your...

Demystifying DevSecOps Practices and Tooling in Container Environments

Demystifying DevSecOps Practices and Tooling in Container Environments

It’s hard to pinpoint when the concept of DevOps entered the mainstream. As late as 2017, implementation was still relatively sparse, with many skeptics questioning the approach or simply wondering what the fuss was all about....

How to Move Through the DevSecOps Maturity Model

How to Move Through the DevSecOps Maturity Model

Products and platforms are key to fully integrating security not just into the application pipeline, but throughout infrastructure, operations, supply chain, and beyond. But products and platforms alone aren’t enough. Many...

Tackling Security in the World of Containers, Hybrid Cloud, and DevSecOps

Tackling Security in the World of Containers, Hybrid Cloud, and DevSecOps

More organizations are transforming their businesses by embracing DevOps principles, microservice design patterns, and container technologies such as Docker and Kubernetes. But, as traditional infrastructure evolves to a mix of...

5 Steps to Secure Your Hybrid Workers

5 Steps to Secure Your Hybrid Workers

Patchwork solutions aren’t the answer—it will take a new approach to address critical challenges in the new workplace.

Biometric Adoption is Driving a Passwordless Future

Biometric Adoption is Driving a Passwordless Future

Enterprises are taking steps to move away from passwords and adopt low-friction authentication methods. The payoff? Greater security.

Invest in Security Now for Tomorrow's Challenges

Invest in Security Now for Tomorrow's Challenges

Transitioning to simplified and scalable connectivity with SASE promises better protection for users and endpoints while optimizing performance

Load More