Doug Bonderud

Copy Editor, Copywriter, Writer

You have a vision. You need a voice.

An award-winning technology and security writer, Doug has a knack for distilling complex concepts down into actionable, readable copy that generates interest and drives engagement.
Categories
Content Types
Whitepaper, Website Copy, Infographic Copy, Ebook, Blog Post, Article
More Information
La Cañada Flintridge, CA USA|English
Publications
N/A

Published Content

47
now.northropgrumman.com
The Stephen Hawking Legacy: From Black Holes to the Big Bang
April 7th, 2018
securityintelligence.com
Ransomware News Revolves Around WannaCry in 2017
May 7th, 2018
securityintelligence.com
April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy
May 2nd, 2018
itbizadvisor.com
Article
Predictive IT: The Intersection of Information and IoT
March 22nd, 2017
itbizadvisor.com
Article
Wireless Networking: Help or Hindrance for Health Care IT?
January 18th, 2017
itbizadvisor.com
Article
2017 IT Conferences: What’s Back, What’s New, and What’s Worth The Trip?
January 13th, 2017
securityintelligence.com
Article
Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10
January 9th, 2017
itbizadvisor.com
Article
NVMe: The New Face of Super-Speed Storage?
January 6th, 2017
itbizadvisor.com
Article
Friend, Not Foe: Automation and the New IT Pro
December 30th, 2016
ipswitch.com
Article
How Much Does the Internet Weigh?
December 8th, 2016
ipswitch.com
Article
Infrastructure Compliance: IT Vendor or In-House?
November 4th, 2016
ipswitch.com
Article
U.S. Cybersecurity Debate: Can Politicians Predict the Top 5 Future Threats?
September 30th, 2016
stream-digitallife.att.com
Article
How to Get Your Home Ready for Fall
September 21st, 2016
ipswitch.com
Article
Stranger Things: The 2016 Edition
September 20th, 2016
securityintelligence.com
Article
3-D Printing Vulnerabilities: Build Your Own Breach?
July 8th, 2016
veracode.com
Article
How AppSec Fits into an Information Security Program
January 28th, 2016
stream-digitallife.att.com
Article
Hosting Tips: Score Big On Game Day
January 11th, 2016
veracode.com
Article
5 Steps to a Better Application Security Program
December 10th, 2015
stream-digitallife.att.com
Article
AT&T Digital Life: What's Trending
December 5th, 2015
veracode.com
Article
Investing in AppSec: What's the Magic Number?
December 4th, 2015
stream-digitallife.att.com
Article
Holiday Hosting With Home Automation
December 2nd, 2015
veracode.com
Article
Cybersecurity in Finance: Time for Change?
November 17th, 2015
skyword.com
Article
Want Engaging Content? The Devil's in the Details
September 30th, 2014
soa.sys-con.com
Article
Evolving the Cloud
May 25th, 2013
securityintelligence.com
Article
Smart Cities, Big Problems? The Risk of Malware in IoT-Enabled Infrastructure
thepulseofit.com
Article
Business intelligence strategies allow SMBs to be giants
thepulseofit.com
Article
Business intelligence solutions: Tapping the ROI of retention
thepulseofit.com
Article
When it comes to server virtualization, start with the basics
thepulseofit.com
Article
5 tips for building a firewall foundation and securing customer data
smartling.com
Article
Global Marketing vs Domestic Marketing: Three Things to Know
smartling.com
Article
Translating Securely When Working with Third-Party Technology
smartling.com
Article
Web Internationalization: A Must for Global Business Success
smartling.com
Article
Five Must-Haves in Translation Management Software
adp.com
Article
Empowering a Global Workforce: Language Lessons
adp.com
Article
#HR2017: Talent Acquisition Trends for 2017 — Tips to Attract Rock Stars
adp.com
Article
#HR2017: Top Innovation Trends Coming This Year
adp.com
Article
Implementing Change Within a Company: 5 Tips for Long-Term Success
securityintelligence.com
Article
Burrowing Bad? Ransomworms Deepen Crypto-Ransomware Threats in 2017
securityintelligence.com
Article
Digital Dividends: Bitcoin Price Breaks $1k to Start 2017
securityintelligence.com
Article
Kettle, Meet Pot: Mobile Phone Hacking Firm Gets Hacked, Loses 900 GB of Data
securityintelligence.com
Article
Missing Security Plus Malicious Attacks Equals Massive MongoDB Servers Breach
securityintelligence.com
Article
Tricky Tracking: New Cross-Browser Fingerprinting IDs User Hardware
securityintelligence.com
Article
Cybersecurity Meltdown? UK Skills Shortage Puts Companies in the Hot Seat
securityintelligence.com
Article
The Future of File Fraud? Spora Ransomware Offers Tiered Pricing and Complex Encryption
securityintelligence.com
Article
Rising Data Breaches Put Health Care Security on Life Support
securityintelligence.com
Article
No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs
securityintelligence.com
Article
New ICS Malware Irongate Channels Stuxnet to Scam SCADA Systems
© ClearVoice, Inc.