97 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

Revisiting the Top Security Threats of 2017

Many of the security threats we noted at the start of 2017 gripped the public's attention during the past year, foreshadowing major shifts to come in 2018.

Bringing Shadow IT Into the Security Light

Shadow IT is created by employees accessing cloud services without prior approval, and it can be devastating to your enterprise's security posture.

Don’t Let Network Complexity Tangle Up Your Security Strategy

Overwhelmed network managers can significantly reduce network complexity by using automation in tandem with a well-defined policy.

Fileless Malware Prompts Evolution of Endpoint Defenses

A new generation of fileless malware has emerged, taking advantage of dynamic environments and prompting the need for more advanced defenses.

Evolving Cloud-Native Applications Require New Best Practices

As cloud-native applications become faster and more flexible, the security solutions that protect these applications must take on the same characteristics.

SecDevOps: Putting Security at the Heart of DevOps

A SecDevOps cycle can help companies accelerate the development process, reduce code vulnerabilities and bridge the gap between agility and security.

Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.

Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The Cloud Security Risks Hidden in Plain Sight

Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.