98 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

Avoiding Security Hype, the Hazard From Hollywood

Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.

Zombie Cloud Data: What Your Delete Key May Not Delete

Zombie cloud data — information that lingers in the cloud even after a user supposedly deletes it — can open organizations to data theft and noncompliance.

Compliance Does Not Always Cure Health Care Security Woes

Compliance should be viewed as a framework to facilitate security, not a magic wand to make threats and vulnerabilities disappear.

Who Is Responsible for IoT Security?

As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.

Zero-Day Malware Poses a Growing Threat

The increasing sophistication of cybercriminals has led to a significant surge in zero-day malware, according to a recent report.

Making GRC — Governance, Risk and Compliance — More Than Just Buzzwords

Although governance, risk and compliance are critical to enterprise security, many IT professionals struggle to secure executive buy-in for GRC tools.

Putting IoT Security Front and Center

The Internet of Things is growing rapidly, and more devices means more opportunities for attackers to expose IoT security gaps.

The Third-Party Security Challenge

Organizations need to assess third-party security to determine whether their partners and contractors are putting critical data at risk.

Artificial Intelligence in Security: How Smart Is Smart?

To fully embrace the power of the cognitive era, security professionals must understand the capabilities and limitations of artificial intelligence.

Nine Security Practices That May Not Be Effective

Many common security practices and widely used tools such as firewalls and IDS fail to adequately address the challenges IT professionals face today.