101 Posts

Rick M Robinson

Rick Robinson is a writer and blogger, with a current 'day job' focus on the tech industry and a particular interest in the interplay of tech-driven factors and business considerations - think of the relationship between virtualization and cloud computing. Rick also blogs at Rocketpunk Manifesto on outer space, possible futures, speculative technology, and speculative literature. He has also had print articles published on aviation and military history.

Written By Rick M Robinson

Foreign Policy in the Age of Cybersecurity Threats

In response to emerging cybersecurity threats and challenges, the Obama administration has launched a wide-ranging response with foreign policy goals.

Mobile Threats Underline Mobile Security Challenges

Recent mobile security vulnerabilities faced by Verizon and AT&T point to the scope and variety of mobile threats and how firms are responding to them.

The Evolving CISO Policy Role

More attention is being focused on the evolving role of the CISO, who must now provide technical knowledge and help shape security policies.

Wiper Malware Poses Destructive Threat

Wiper malware can destroy important data and cripple computer systems. It was most recently used in the high-profile breach against Sony Pictures.

Cross-Site Scripting Attacks Pose Ongoing Threat

Cross-site scripting (XSS) attacks exploit Web design tools to sneak malicious scripts onto users' browsers. Preventive measures can minimize the risk.

Malicious Domains Can Give You the .Biz

Understanding the common tactics that cybercriminals use to mask malicious domains is key to keeping users from clicking on harmful links.

External Threats a Top Concern for CISOs

What is the biggest challenge for CISOs today? Security leaders will continue to focus on external threats for the foreseeable future.

Security Technology a Top Focus for CISOs

Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.

CISO Assessment: For Security Leaders, a Stronger Voice

According to IBM's third annual CISO assessment, CISOs are gaining more influence in the C-suite in response to growing security threats.

The Great Mobile Security Reboot

Mobile security poses challenges, but it also gives firms a chance to build security anew, free of legacy code that sometimes dates back 40 years.