83 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

To Fight Cybercriminals, Follow the Money Trail

Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.

Administrator Credentials: A Security Breach Waiting to Happen

If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.

Cloud Security Is Not an Either/Or

Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.

The Enemy Within: Identifying Insider Threats in Your Organization

According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.

Back to Basics: Six Simple Strategies to Strengthen Your Security Posture

These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.

Avoiding Security Hype, the Hazard From Hollywood

Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.

Zombie Cloud Data: What Your Delete Key May Not Delete

Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.

Compliance Does Not Always Cure Health Care Security Woes

Compliance should be viewed as a framework to facilitate security, not a magic wand to make threats and vulnerabilities disappear.

Who Is Responsible for IoT Security?

As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.

Zero-Day Malware Poses a Growing Threat

The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.