Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

What it takes to be a security consultant

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services

Machine learning proves its worth to business

Machine learning proves its worth to business

AI on the verge: Early adopters reap business benefits, as machine learning nears the mainstream

To the cloud! Real-world container migrations

To the cloud! Real-world container migrations

Forward-thinking organizations offer real-world lessons for containerizing enterprise apps for the cloud

Machine learning offers new hope against cyber attacks

Machine learning offers new hope against cyber attacks

Game-changing technology could deliver a new level of protection for enterprise networks

Blockchain: You’ve got questions; we’ve got answers

Blockchain: You’ve got questions; we’ve got answers

Everything you need to know about an overhyped, but promising technology

Mobile management vendors compared

Mobile management vendors compared

We have the goods on 11 top vendors, in 10 different features categories

Real-world devops failures -- and how to avoid them

Real-world devops failures -- and how to avoid them

To deliver on the promise of devops, heed these hard-earned lessons of devops gone wrong

7 steps to biometric bliss

7 steps to biometric bliss

Here's how to enable biometric security technologies in your enterprise

Identifying the security pitfalls in SDN

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease admin tasks, it can also create new vulnerabilities

The hidden pitfalls of going freelance in IT

The hidden pitfalls of going freelance in IT

Independence has its upsides and downsides. IT pros lend firsthand advice on the challenges of going solo

Road warriors are prime targets for hackers

Road warriors are prime targets for hackers

Here are some steps companies and executives can take to enhance travel-related security

Crowdsourcing your security

Crowdsourcing your security

Many security execs have come to rely on a broad 'team' to bolster cyber and physical security

The real dirt on programming certifications

The real dirt on programming certifications

Code alone might not be enough to land you that top job

Antivirus doesn’t work. So why are you still using it?

Antivirus doesn’t work. So why are you still using it?

Standalone antivirus can no longer stop the sophisticated barrage of key loggers, backdoors, rootkits, Trojan horses, worms, and spyware

Robotic process automation: The new IT job killer?

Robotic process automation: The new IT job killer?

Robotic process automation has higher-value IT tasks in its cross-hairs but could be the best antidote to outsourcing yet

Mobile device management continues to broaden

Mobile device management continues to broaden

Think 'enterprise mobility management,' which includes app and data security, among other things

MDM features and functions compared

Use this comprehensive checklist to compare 10 of the leading mobile device management suites

You’ve been hacked. Now what?

You’ve been hacked. Now what?

6 key things to do after a security breach

Betting big on the 'SMAC stack'

The notion of combining social, mobile, analytics and cloud into one integrated architectural pipe is gaining traction

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security

Load More