99 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

Pick a Card, Any Card: Deception, the Human Mind and the Social Engineering Challenge

Social engineering schemes such as spear phishing rely on the human mind's inclination toward self-deception to motivate users to open malicious links.

Fail-Safe Security: Protecting Data From Cloud and Third-Party Risks With Encryption

Fail-safe measures such as encryption can help organizations minimize cloud and third-party risks in the virtually inevitable event of a data breach.

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

Without the proper context of risk analysis, evaluations of security investments that involve ROI calculations are virtually meaningless.

The Cloud Security Risks Hidden in Plain Sight

Organizations must pay closer attention to cloud security risks, such as third-party access and human error, that are hiding in plain sight.

The Myth of Mutual Exclusivity: Making the DevOps Process More Agile Without Compromising Security

Does agility make the DevOps process less secure? A new survey suggested that, contrary to popular belief, security and agility aren't mutually exclusive.

e-Signature Security Speeds Government Paperwork Along

The U.S. Census Bureau hopes to save $1.2 million annually by implementing e-signature technology in its internal personnel evaluation system.

Risk Governance: The True Secret Weapon of Cybersecurity

While security solutions can certainly help organizations fight ransomware and other threats, the best defense is a robust risk governance strategy.

Personal Electronic Devices Dodge TSA Ban — For Now

To the chagrin of enterprise security experts, the TSA recently decided against a proposed ban on packing personal electronic devices in carry-on luggage.

To Fight Cybercriminals, Follow the Money Trail

Most cybercriminals are after money. To safeguard your network from money-hungry fraudsters, you need to know where your most valuable assets are stored.

Administrator Credentials: A Security Breach Waiting to Happen

If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.