91 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

When E-commerce Security Meets Brick-and-Mortar Retail

The line between physical storefronts and online retail is blurring, and as a result, e-commerce security is getting more complicated.

Information Security Trainings: Summer School Edition

Is it time to send your employees to summer school? As temperatures climb, set up information security trainings to increase their security awareness.

Can Artificial Intelligence Be Safe?

As artificial intelligence evolves, its related security concerns and implications will grow, as well. How can this technology be developed safely?

Cloud Risks Pose the Latest Security Education Challenge

Employees must be educated to avoid cloud risks and ensure this new era of cloud technology is a secure one for their organizations.

Your CISO Guide to Spring Cleaning

Your CISO and IT security team must be prepared to conduct a thorough spring cleaning of the IT environment to strengthen security and reduce risk.

Being Hackable and the New Security Conundrum

As applications and their security systems become more complex, more eyes are needed to create and review the process — which in turn makes them hackable.

Security Tips for Tax Season — and Beyond

The IRS recently released security tips that individuals and businesses should consider when filing important tax information online.

Flood of Mobile Apps Poses Growing Security Challenge

Mobile apps are being pushed out at a rapid pace, which places a lot of pressure on security teams to develop fast-acting and comprehensive strategies.

Connected Devices Are Transforming the Medical World, but Pose Security Challenges

Connected devices have the potential to change how people approach and manage health care, but security must remain top of mind.

Is Your Antivirus Software Vulnerable to Attack?

Antivirus software has the potential to provide an attack surface for savvy cybercriminals — provided they can find any vulnerabilities in the tools.