14 Posts

Rick Robinson

Product Manager, Encryption and Key Management

Rick Robinson comes from a diverse background of architecture, development, and deployment of new products and services that employ cryptography in one form or another. He has numerous patents in the area of cryptography and computer security and helped customers in the financial, health, retail, manufacturing, and government sectors. Rick has been an active proponent of cryptography for business – applying standards-based cryptography, key management, PKI, and secure protocols to help business stay competitive in the ever-changing world of data security.

Written By Rick Robinson

Need-to-Know Only: Use Encryption to Make Data Meaningless to Prying Eyes

Data encryption is one of the most basic — and, given the right tools, most effective — ways to protect sensitive information from cybercriminals.

How Encryption Makes Your Sensitive Cloud-Based Data an Asset, Not a Liability

It's critical to protect sensitive cloud-based data using encryption while it is being stored, and to delete it securely at the end of its life cycle.

Achieving Security Conformance: The Importance of Encryption and Key Management Standards

Modern encryption standards have the potential to drastically improve the overall security of industries and the individual security products they use.

Three Things You Need to Know About Mainframes in the Cloud — and Why the z13s Rocks!

IBM has announced the z13s, a secure, high-volume, transaction-designed rocket ship ready to help businesses enhance their transaction processing.

Encrypted Data Islands: Encryption Keys Are Lost but Not Forgotten

Managing data encryption and encryption keys is essential for organizations to keep data under their control, whether it's on-premises or in the cloud.

Two Important Lessons from the Ashley Madison Breach

The Ashley Madison data breach was one of the most notable of 2015 so far, and there are several security lessons buried in the scandalous headlines.

Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough

Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.

What Do Silver Bullets, Bearings and Engines Have to Do With Security Intelligence?

While we have mastered designing and implementing bearings over time, we seem to continue to struggle with keeping security intelligence up-to-date.

The Impact of a Data Breach Can Be Minimized Through Encryption

As data breaches continue to plague retailers, organizations should consider encrypting their data to help reduce the impact of a potential data breach.

Cloud Key Management: Coming to a Cloud Near You

Cloud offerings are becoming a mainstay in Internet resources, but how do we control our cloud data? What is your cloud key management strategy?