538 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

Spear Phishing Report Card: Perfect Scores in School Security Pen Testing

According to a new U.K.-based study, 100 percent of test spear phishing attacks gained access to sensitive university data in less than two hours.

April Scams May Ruin Plans: Threat Actors Ramp Up for Tax Scam Season

Tax scam season has arrived. Here's what enterprises need to know to keep their corporate assets safe from tax-time scammers.

Podcast: Muscle Memory and Cyber Fitness Training

Basic cyber hygiene only goes so far. Organizations need immersive cyber fitness training to make better decisions in the face of crisis situations.

Podcast: Zero Trust and the Evolving Role of Identity and Access Management

IAM isn't a zero-sum game. In this week's podcast, IBM security experts discuss the evolution of identity and access management solutions.

Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture

Shared security culture is now critical for organizations to prevent IT burnout and respond to emerging threats. But what does this look like in practice?

Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Spring is just around the corner, which means it's time for CISOs to evaluate their security strategy, eliminate processes that aren't working, and adopt new cybersecurity practices and technologies.

Recapping IBM Think 2019 and HIMSS19: The Shared Landscape of Global Security

We're only a few months into the year, but HIMSS19 and Think 2019 have already helped shape this year's focus on enterprise transformation, innovation and global cybersecurity.

Smoke Loader Botnet Still Active on Black Market After 8 Years

The Smoke Loader botnet, publicly available since 2011, is still active on the black market — with more than 1,500 active samples detected in the past six months.

Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.

Catastrophe, Not Compromise: VFEmail Attack Destroys Decades of Data

The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.