98 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

The Cloud Security Risks Hidden in Plain Sight

Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.

The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security

Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.

e-Signature Security Speeds Government Paperwork Along

The U.S. Census Bureau hopes to save $1.2 million annually by implementing e-signature technology in its internal personnel evaluation system.

Risk Governance: The True Secret Weapon of Cybersecurity

While security solutions can certainly help organizations fight ransomware and other threats, the best defense is a robust risk governance strategy.

Personal Electronic Devices Dodge TSA Ban — For Now

To the chagrin of enterprise security experts, the TSA recently decided against a proposed ban on packing personal electronic devices in carry-on luggage.

To Fight Cybercriminals, Follow the Money Trail

Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.

Administrator Credentials: A Security Breach Waiting to Happen

If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.

Cloud Security Is Not an Either/Or

Cloud security is neither a magic bullet for analysts, nor a particularly vulnerable target for cybercriminals. It all depends on the effort you put in.

The Enemy Within: Identifying Insider Threats in Your Organization

According to recent research, privileged users and administrators represent the biggest insider threats to any organization's sensitive data.

Back to Basics: Six Simple Strategies to Strengthen Your Security Posture

These six basic strategies can help organizations stop some threats, minimize others and improve their overall security posture.