Bob Violino

Contributing Writer

Bob Violino is a freelance writer who covers a variety of technology and business topics.

Hyperconvergence: What’s all the hype about?

Hyperconvergence: What’s all the hype about?

One of the hottest trends in data center technology is hyperconvergence, with early adopters reaping the benefits of cost savings, enhanced data protection, increased scalability and ease of management. So, what is hyperconvergence?...

As Workplace Collaboration Evolves, Wireless Audio Conferencing Plays a Key Role

As Workplace Collaboration Evolves, Wireless Audio Conferencing Plays a Key Role

The nature of the workplace is changing dramatically. Project teams are typically more geographically dispersed and more mobile. And yet, in some ways they remain more connected than ever. More than 8 in 10 managers in a 2016...

Real-world container migrations

Real-world container migrations

Forward-thinking organizations offer real-world lessons for containerizing enterprise apps for the cloud

Robots present a cyber risk

Robots present a cyber risk

The prospect of an army of robots marching in unison to launch an attack on an unsuspecting city belongs in the realm of science fiction—as do most images of menacing autonomous machines wreaking all kinds of havoc on civilization.

Security challenge: Wearing multiple hats in IT

Security challenge: Wearing multiple hats in IT

Handling both security and IT duties involves a daily balancing act for the resource-constrained IT organizations that must take this approach. But along with the challenges, there can also be benefits.

Mergers create greater security risk

Mergers create greater security risk

Security risks, both cyber and physical, certainly belong on the list of concerns. And with the ongoing shortage of professionals who are expert in various aspects of data protection—coupled with the seemingly endless stream of...

Data lakes security could use a life preserver

Data lakes security could use a life preserver

As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a...

Machine learning offers new hope against cyber attacks

Machine learning offers new hope against cyber attacks

Machine learning can help companies detect cyber attacks by analyzing patterns and behavior.

Blockchain: You’ve got questions; we’ve got answers

Blockchain: You’ve got questions; we’ve got answers

Everything you need to know about an overhyped, but promising technology.

Mobile management takes on apps, content

Mobile management takes on apps, content

Enterprise mobile management suites are adding app- and content-management features to the roster of duties they perform.

Mobile management vendors compared

Mobile management vendors compared

We have the goods on 11 top vendors, in 10 different features categories.

IoT pushes IT security to the brink

IoT pushes IT security to the brink

The Internet of Things (IoT) offers many possible benefits for organizations and consumers—with unprecedented connectivity of countless products, appliances and assets that can share all sorts of information. IoT also presents a...

Chief Risk Officers needed to battle rising corporate espionage

Chief Risk Officers needed to battle rising corporate espionage

A growing number of organizations are adding a new member to the C-suite—the chief risk officer (CRO)—and the rise of these executives is having a direct impact on the security programs at enterprises.

7 steps to biometric bliss

7 steps to biometric bliss

Every time you access your phone via fingerprint reader, you’re using biometric identification technology. So, while biometrics on the consumer side has become commonplace, a number of barriers have blocked widespread biometric...

How an audit can shore up your security strategy

How an audit can shore up your security strategy

The high-profile data breaches of recent years have forced many organizations to take a closer look at their security technologies and policies, experts say.

Identifying the security pitfalls in SDN

Identifying the security pitfalls in SDN

While a software-defined network can improve application performance and help ease administrative tasks, it can also create new vulnerabilities. Experts offer advice for security teams.

Overcoming stubborn execs for security sake

Overcoming stubborn execs for security sake

Clashes with senior business executives as well as those at lower levels of organizations make it more challenging for CSOs and CISOs to create a secure environment, and yet they continue to happen.

What security pros want for the new year

What security pros want for the new year

A few execs had some pie-in-the-sky ideas while others were a bit more grounded in reality.

Wearables, IoT spark interest in mobility management tools

Wearables, IoT spark interest in mobility management tools

BYOD hype has abated, but the problems of unmanaged devices are real.

The hidden pitfalls of going freelance in IT

The hidden pitfalls of going freelance in IT

Independence has its upsides and downsides. IT pros lend firsthand advice on the challenges of going solo

Load More