Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

Blockchain: You’ve got questions; we’ve got answers

Blockchain: You’ve got questions; we’ve got answers

Everything you need to know about an overhyped, but promising technology

Mobile management vendors compared

Mobile management vendors compared

We have the goods on 11 top vendors, in 10 different features categories

Real-world devops failures -- and how to avoid them

Real-world devops failures -- and how to avoid them

To deliver on the promise of devops, heed these hard-earned lessons of devops gone wrong

7 steps to biometric bliss

7 steps to biometric bliss

Here's how to enable biometric security technologies in your enterprise

Identifying the security pitfalls in SDN

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease admin tasks, it can also create new vulnerabilities

The hidden pitfalls of going freelance in IT

The hidden pitfalls of going freelance in IT

Independence has its upsides and downsides. IT pros lend firsthand advice on the challenges of going solo

Road warriors are prime targets for hackers

Road warriors are prime targets for hackers

Here are some steps companies and executives can take to enhance travel-related security

Crowdsourcing your security

Crowdsourcing your security

Many security execs have come to rely on a broad 'team' to bolster cyber and physical security

The real dirt on programming certifications

The real dirt on programming certifications

Code alone might not be enough to land you that top job

Antivirus doesn’t work. So why are you still using it?

Antivirus doesn’t work. So why are you still using it?

Standalone antivirus can no longer stop the sophisticated barrage of key loggers, backdoors, rootkits, Trojan horses, worms, and spyware

Robotic process automation: The new IT job killer?

Robotic process automation: The new IT job killer?

Robotic process automation has higher-value IT tasks in its cross-hairs but could be the best antidote to outsourcing yet

Mobile device management continues to broaden

Mobile device management continues to broaden

Think 'enterprise mobility management,' which includes app and data security, among other things

MDM features and functions compared

Use this comprehensive checklist to compare 10 of the leading mobile device management suites

You’ve been hacked. Now what?

You’ve been hacked. Now what?

6 key things to do after a security breach

Betting big on the 'SMAC stack'

The notion of combining social, mobile, analytics and cloud into one integrated architectural pipe is gaining traction

SDS still young, but very much on the rise

Offering increased protection and a simplified approach, software-defined security is shaping up to be the next big thing in IT security

BYOD morphs from lockdown to true mobility

Four companies that have been at BYOD for a while talk about how their programs have changed with the times

Developing a smart approach to SMAC security

As businesses look to take advantage of SMAC (social, mobile, analytics, and cloud) platforms, they first need to consider the risks and security implications of the technologies involved

9 signs you should jump ship to a new job

Poor teamwork, little experimentation, no clear career path -- your employer may be sending unmistakable signals of career stagnation. Don’t miss them

A clear-eyed guide to Mac OS X's actual security risks

Apple has improved its security in recent years, but is it enough?

Load More