432 Posts

Douglas Bonderud

Freelance Writer

A freelance writer for three years, Doug Bonderud is a Western Canadian with expertise in the fields of technology and innovation. In addition to working for the IBM Midsize Insider, The Content Standard and Proteomics programs for Skyword, Doug also writes for companies like Ephricon Web Marketing and sites such as MSDynamicsWorld. Clients are impressed with not only his command of language but the minimal need for editing necessary in his pieces. His ability to create readable, relatable articles from diverse Web content is second to none. He has also written a weekly column for TORWars, a videogaming website; posts about invention and design for InventorSpot.com and general knowledge articles for WiseGeek. From 2010-2012, Doug did copywriting for eCopywriters.com. Doug is currently a municipal police officer, on track to become a fantasy/sci-fi author.

Written By Douglas Bonderud

Billion-Dollar Security Breach? Unpacking the SEC Compromise

A security breach at the SEC could have serious repercussions, including billions of dollars worth of insider trading.

Report: Employees Outpace Fraudsters as Source of Cybersecurity Threats

According to a recent survey, trusted employees, not cybercriminals, are responsible for the majority of cybersecurity threats affecting SMBs.

The Telltale Text File: Security Researcher Proposes Standardization for Reporting Vulnerabilities

Security researcher Ed Foudil proposed adding a security.txt to every website to standardize the process of reporting vulnerabilities.

National IT Professionals Day: Recognizing the Saintly Patience of IT Workers

CISOs should take a moment to recognize the hard work, patience and resilience of their staffers on National IT Professionals Day.

Green Security Technology: The New Corporate Color?

Companies all over the world are going green, but due to budgetary limitations and industry customs, many have yet to adopt green security technology.

Risky Routers? New Malware Attacks Leverage Popular Hardware by Proxy

New malware attacks are using popular router hardware to carry out proxy-based credential stuffing. Admins should regularly install firmware updates.

Speedy Security Breach: Threat Actors Develop Apache Exploit Within Hours of Disclosure

Even with a patch available for the new Struts vulnerability, threat actors developed new exploits within hours and coordinated security breach attacks.

Quantum Data Protection: The Birth of an Unhackable Box?

CalTech researchers created a chip-sized unhackable box, which represents a significant step forward in the field of quantum data protection.

Poor Password Policy? New Study Probes Prevalent Protection Problems

A new study found that most web services have poor password policy. What's the prescription for these protection problems?

Cloud Security and the New Cold War: Corporate Strategies for Winning Digital Battles

Companies and governments around the world must test their cloud security capabilities to keep sensitive data safe from hacktivists and cyber enemies.