Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

IoT: A vulnerable asset but also a tool in disaster recovery

3 real-world examples of IoT rolled out in the enterprise

3 real-world examples of IoT rolled out in the enterprise

Without network support, businesses may not be able to reap all the benefits of the data IoT generates.

IoT standards battles could get messy

IoT standards battles could get messy

As enterprises start to think about building Internet of Things (IoT) networks, the key question becomes: What’s happening on the standards front?

What it takes to be a security architect

What it takes to be a security architect

While the path to security architect varies, anyone considering the role should have a passion for IT infrastructure and protecting data.

What it takes to be a security consultant

What it takes to be a security consultant

The move to security consultant can be rewarding and challenging (in a good way), but be prepared to market and sell yourself and your services.

What it takes to become a chief information security officer (CISO)

What it takes to become a chief information security officer (CISO)

A CISO typically has a technical information security or IT risk background, but the path that leads to the role can vary greatly. Here’s how one CISO landed his first job in the position.

Machine learning proves its worth to business

Machine learning proves its worth to business

AI on the verge: Early adopters reap business benefits, as machine learning nears the mainstream

Ultimate guide to strategic tech partners

Ultimate guide to strategic tech partners

In today’s fast-changing vendor landscape, market leaders are facing new challengers in security, data center, cloud, networking and wireless.

Continuous authentication: Why it’s getting attention and what you need to know

Continuous authentication: Why it’s getting attention and what you need to know

In some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in.

Are companies doing enough on the IoT security front?

Are companies doing enough on the IoT security front?

If security executives thought they had a lot to handle with the growth of mobile devices and the expanding digital enterprise, the emergence of connected products, corporate assets, vehicles and other “things” is taking security...

Hyperconvergence: What’s all the hype about?

Hyperconvergence: What’s all the hype about?

One of the hottest trends in data center technology is hyperconvergence, with early adopters reaping the benefits of cost savings, enhanced data protection, increased scalability and ease of management. So, what is hyperconvergence?...

As Workplace Collaboration Evolves, Wireless Audio Conferencing Plays a Key Role

As Workplace Collaboration Evolves, Wireless Audio Conferencing Plays a Key Role

The nature of the workplace is changing dramatically. Project teams are typically more geographically dispersed and more mobile. And yet, in some ways they remain more connected than ever. More than 8 in 10 managers in a 2016...

Load More