64 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

The Four Leading Security Threats of 2017

Long-standing security threats such as social engineering are predicted to take on new dimensions in the year ahead.

Chip-and-PIN Credit Cards, One Year On

At the end of 2016, more than a year after the official liability shift, most large retailers in the U.S. have finally adopted chip-and-PIN credit cards.

A User’s Guide to Cybersecurity Leadership

Despite the rapid expansion of third-party risks, a recent survey revealed that many companies lack the cybersecurity leadership to respond effectively.

The BYOD Policy Holiday Challenge

Many employees are sure to return to work after the holiday with brand new mobile devices, creating a variety of BYOD policy challenges for IT managers.

Protect Sensitive Files With Document Security Management

Although most companies have invested in file management tools, document security remains a challenge due to widespread mobile use and BYOD culture.

Cybersecurity Lessons From the 2016 Presidential Election

The 2016 presidential election offered many cybersecurity lessons and highlighted the importance of securing all types of data.

Using Layered Security to Keep Warm for the Winter

Security teams must implement layered security capabilities to defend against the variety of threats fraudsters launch to capitalize on the holiday bustle.

Fantasy League Security Risks Could Spoil a Season

The online fantasy sports gaming industry is growing rapidly. Unfortunately, so is the list of fantasy league security risks that threaten users' data.

Company Security Policies and Reading the Fine Print

Company security policies are usually long, convoluted and filled with jargon. This discourages users from reading the all-important fine print.

The Growing Threat of Cyber Extortion

In the shadowy world of security threats and bad actors, cyber extortion is a growing trend. Cybercriminals are taking advantage of the vulnerability of intellectual property, threatening to release potentially embarrassing information and...