Bonini

My Work
Check out some of my most recent tech articles, ghostwriting pieces, guest posts, product reviews, and more. Come back often! The page is constantly updated.
Tech Article
7 Software Security Lessons to Avoid Repeating in 2025
2024 was another rough ride for organizations of all sizes. Ransomware hit unprecedented new highs, with nearly three-quarters of the businesses polled by OpenText reporting experiencing at least one attack that year...
Tech Article
Active Directory Certificate Services 101: An Overview
Imagine a world where securing your SMB’s communications isn’t too expensive or overly complicated. This would be a place where even the +80% of SMB victims of at least one cyber attack in the 12 months before June 2024...
Guest Post - HackerNoon
I Tested the AirDroid Business Mobile Device Management Solution — Here’s What I Think
54% of organizations interviewed by Ponemon in 2024 were victims of a data breach as attackers managed to access one or more of their employees' mobile devices. A robust mobile device management (MDM) solution can help businesses minimize this risk. I’ve tested one for you. Here’s my personal view...
Tech Article
How to Sign Packages with an Azure Key Vault Signing Certificate
Microsoft Azure was the second most used platform by developers participating in the 2023 Stack Overflow Developers Survey. Azure Key Vault cloud service is part of that platform. It provides a single interface to securely store, manage, and access secrets, certificates, and cryptographic keys....
Tech Article
8 Steps for Securing Your CI/CD Pipeline
Data from the 2024 State of Continuous Integration/Continuous Delivery (CI/CD) report shows that developers who use self-hosted and managed CI/CD platforms are 23% more likely to restore service after an incident faster than those not using CI/CD...
Tech Article
7 Cyber Security Basics Every SMB Should Know
78% of SMBs are concerned that a cyber attack could put them out of business. Do you feel the same but have no idea where to start to protect your data, customers, and often cloud-based systems from the bad guys?...
Guest Post - HackerNoon
3 Real-World Examples of Why Companies Need Better Email Authentication
62% of phishing emails bypassed DMARC email authentication checks in the first half of 2024. Explore why and how your email authentication strategy game needs to move beyond these basic checks and face these new challenges head-on...
Tech Article
Email Security Best Practices & Tips From 10 Industry Experts
How secure is your email? Hint: It’s not as safe as you think. Between October 2013 and December 2023, small and large organizations worldwide reported to the FBI’s Internet Crime Complaint Center (IC3) a total of $55.5 billion worth of losses. The root cause?...
Tech Article
How to Implement Continuous Threat Exposure Management (CTEM) Within Your Small Business
The world’s economy has slowed down in 2024, leaving businesses and individuals with less money in their pockets. But business is booming for bad guys...
Tech Article
6 Real-World SMB Cyber Security Threats That Will Keep You Up at Night
JumpCloud reports that 84% of the IT professionals at small and medium enterprises (SMEs) polled in Q3 2024 say they’re worried about the security of applications and resources managed outside of IT (i.e., shadow IT)...
Tech Article
The Ultimate Code Signing in Visual Studio Tutorial
Signing your code is more important than ever. CrowdStrike reports that in 2023, application security professional survey respondents indicated that 70% of critical security incidents took organizations more than 12 hours to resolve...
Tech Article
How to Set Up SSH Without a Password in Linux
In 2022, Linux malware hit record numbers with Atlas VPN researchers reporting a 50% year-over-year increase and a whopping 117% increase in Q4 alone. This shows that while Linux remains one of the “safer” options compared to other operating systems, it isn’t immune to security threats...