Doug Bonderud

Copy Editor, Copywriter, Writer

You have a vision. You need a voice.

An award-winning technology and security writer, Doug has a knack for distilling complex concepts down into actionable, readable copy that generates interest and drives engagement.
Categories
Content Types
Whitepaper, Website Copy, Infographic Copy, Ebook, Blog Post, Article
More Information
La Cañada Flintridge, CA USA|English
Publications
N/A

Published Content

47
now.northropgrumman.com
The Stephen Hawking Legacy: From Black Holes to the Big Bang
April, 7 2018
securityintelligence.com
Ransomware News Revolves Around WannaCry in 2017
May, 7 2018
securityintelligence.com
April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy
May, 2 2018
itbizadvisor.com
Article
Predictive IT: The Intersection of Information and IoT
March, 22 2017
itbizadvisor.com
Article
Wireless Networking: Help or Hindrance for Health Care IT?
January, 18 2017
itbizadvisor.com
Article
2017 IT Conferences: What’s Back, What’s New, and What’s Worth The Trip?
January, 13 2017
securityintelligence.com
Article
Bearing Fruit: The Future of Mobile Technology as Apple’s iPhone Turns 10
January, 9 2017
itbizadvisor.com
Article
NVMe: The New Face of Super-Speed Storage?
January, 6 2017
itbizadvisor.com
Article
Friend, Not Foe: Automation and the New IT Pro
December, 30 2016
ipswitch.com
Article
How Much Does the Internet Weigh?
December, 8 2016
ipswitch.com
Article
Infrastructure Compliance: IT Vendor or In-House?
November, 4 2016
ipswitch.com
Article
U.S. Cybersecurity Debate: Can Politicians Predict the Top 5 Future Threats?
September, 30 2016
stream-digitallife.att.com
Article
How to Get Your Home Ready for Fall
September, 21 2016
ipswitch.com
Article
Stranger Things: The 2016 Edition
September, 20 2016
securityintelligence.com
Article
3-D Printing Vulnerabilities: Build Your Own Breach?
July, 8 2016
veracode.com
Article
How AppSec Fits into an Information Security Program
January, 28 2016
stream-digitallife.att.com
Article
Hosting Tips: Score Big On Game Day
January, 11 2016
veracode.com
Article
5 Steps to a Better Application Security Program
December, 10 2015
stream-digitallife.att.com
Article
AT&T Digital Life: What's Trending
December, 5 2015
veracode.com
Article
Investing in AppSec: What's the Magic Number?
December, 4 2015
stream-digitallife.att.com
Article
Holiday Hosting With Home Automation
December, 2 2015
veracode.com
Article
Cybersecurity in Finance: Time for Change?
November, 17 2015
skyword.com
Article
Want Engaging Content? The Devil's in the Details
September, 30 2014
soa.sys-con.com
Article
Evolving the Cloud
May, 25 2013
securityintelligence.com
Article
Smart Cities, Big Problems? The Risk of Malware in IoT-Enabled Infrastructure
thepulseofit.com
Article
Business intelligence strategies allow SMBs to be giants
thepulseofit.com
Article
Business intelligence solutions: Tapping the ROI of retention
thepulseofit.com
Article
When it comes to server virtualization, start with the basics
thepulseofit.com
Article
5 tips for building a firewall foundation and securing customer data
smartling.com
Article
Global Marketing vs Domestic Marketing: Three Things to Know
smartling.com
Article
Translating Securely When Working with Third-Party Technology
smartling.com
Article
Web Internationalization: A Must for Global Business Success
smartling.com
Article
Five Must-Haves in Translation Management Software
adp.com
Article
Empowering a Global Workforce: Language Lessons
adp.com
Article
#HR2017: Talent Acquisition Trends for 2017 — Tips to Attract Rock Stars
adp.com
Article
#HR2017: Top Innovation Trends Coming This Year
adp.com
Article
Implementing Change Within a Company: 5 Tips for Long-Term Success
securityintelligence.com
Article
Burrowing Bad? Ransomworms Deepen Crypto-Ransomware Threats in 2017
securityintelligence.com
Article
Digital Dividends: Bitcoin Price Breaks $1k to Start 2017
securityintelligence.com
Article
Kettle, Meet Pot: Mobile Phone Hacking Firm Gets Hacked, Loses 900 GB of Data
securityintelligence.com
Article
Missing Security Plus Malicious Attacks Equals Massive MongoDB Servers Breach
securityintelligence.com
Article
Tricky Tracking: New Cross-Browser Fingerprinting IDs User Hardware
securityintelligence.com
Article
Cybersecurity Meltdown? UK Skills Shortage Puts Companies in the Hot Seat
securityintelligence.com
Article
The Future of File Fraud? Spora Ransomware Offers Tiered Pricing and Complex Encryption
securityintelligence.com
Article
Rising Data Breaches Put Health Care Security on Life Support
securityintelligence.com
Article
No Wriggle Room? ZCryptor Ransomware Worms Its Way Onto PCs
securityintelligence.com
Article
New ICS Malware Irongate Channels Stuxnet to Scam SCADA Systems
© ClearVoice, Inc.