Author Archives: CloudTweaks

Is The Internet of Things A Perfect Storm?

Is The Internet of Things A Perfect Storm?

Is The Internet of Things A Perfect Storm?

There has been a great deal of discussion surrounding the Internet of Things over the past couple of years as more companies are taking an active and aggressive interest. IBM for example has recently decided to invest $3 Billion over the next 4 years.

“Our knowledge of the world grows with every connected sensor and device, but too often we are not acting on it, even when we know we can ensure a better result,” said Bob Picciano, senior vice president, IBM Analytics. “IBM will enable clients and industry partners apply IoT data to build solutions based on an open platform. This is a major focus of investment for IBM because it’s a rich and broad-based opportunity where innovation matters.”

Research firm IDC predicts the market to hit $7 Trillion by 2020 and there appears to be a growing number of venture capital firms shifting investment funds into the new IoT and IoE markets.

“The connected car and home are as big an opportunity as the connected phone,said Venky Ganesan, a managing director at Menlo Ventures. “When the iPhone came out in 2007 we had a difficult time seeing all the things that would emerge out of that platform. Similarly, it will be tough to envision and predict all the innovations that are going to emerge out of this platform, but I am sure they will and it will be equally transformative

We’ve published a number of infographics here on CloudTweaks surrounding IoT but very few as creative as the one found at 451 Research.  Click the image to zoom or visit the link at 451 Research to see a larger version.


Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety

This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure, the RSA Conference covers all facets of modern security.

Speakers at this year’s event run the gamut of modern security and security policy. Among the speakers is Senior Vice President and General Manager at Intel Security Group Christopher Young, Vice President and Chief Architect at Cisco Martin Roesch, U.S Department Of Homeland Security Secretary Jeh Charles Johnson, and President of RSA Amit Yoran. These speakers highlight an event that features five days of talks, keynotes, demos, tutorials, and much more. But the big question on my mind is why?

Picking The Lock


I recently listened to a brilliant podcast on locks. In this podcast, the host described the history of locks and ultimately what follows, lock picking. Perfect security, as they described it, was impossible. What began with Robert Barron in 1778 was made obsolete by the later workings of the Chubb brothers, who were then usurped by legendary inventor Joseph Bramah. Bramah was ultimately up-staged by Alfred Charles Hobbs, allowing him to claim a long-standing £200 reward for cracking the challenge lock which hung outside Bramah’s shop at 124 Piccadilly for 67 years.

The moral of the story is perfect security is impossible. This begs the question, what are a bunch of security experts doing collaborating for five straight days? Are they sharing the power to keep information and personal spaces safe? Or are they finding the loopholes? Are they the brilliant Joseph Bramah building the challenge lock, or are they the hell-bent Alfred Charles Hobbs picking it?

The Right Side Of Secure Again

In the wake of the Snowden leaks, people are legitimately angry and striving to find ways to get on the right side of secure again. With devices such the Blackphone 2, which features OS security well beyond that of a stock Android device, becoming a real news story rather than a conspiracy theorist bunker must-have, seemingly ordinary people are finding their own security.

Take the Nymi for example. The Nymi bracelet unlocks devices and deploys passwords by verifying your identity using your heart rate and patterns. Better than a password and security questions, Nymi seems like one of the more perfect solutions I have seen when it comes to truly personalized security.

Beyond hardware, VPN is part of the dialogue beyond the answer of how to watch international Netflix.  At the very least, regular citizens are aware that the privacy heyday is over online. People know, and finally accept, that their security and privacy is not guaranteed and must be enhanced by a combination of new technology and common sense.

(Image Source: Shutterstock)

By Keith Holland

Cloud Infographic – Working Toward A Positive Cloud Experience

Cloud Infographic – Working Toward A Positive Cloud Experience

Positive Cloud Experience

Cloud computing offers tremendous value to Enterprise businesses and even allows small and medium businesses to compete by providing solutions that were previously out of reach because of the cost.

Here are five ways to help you find the best cloud solutions for your business.

  • Security is one of the biggest concerns in cloud computing because you have no handle on your data. This includes the physical security of the infrastructure that holds your data. Does the vendor have contingency plans for natural disasters or even terrorist attacks? Find out how often they back up and how you can recover your data and how quickly.
  • Find out which aspect of cloud computing is best for your business. Infrastructure-as-a-service or utility computing is best if your business needs infrastructure like databases and file servers. Platform-as-a-service serves organizations that also provide some IT services to smaller clients or runs certain computing platforms in order to carry out their business processes. Software-as-a-service is best suited for small businesses that may not be able to afford all the licenses that they may need if they bought individual software packages.
  • Do an extensive audit of your business processes and determine which aspects of it are in dire need of change. Not everything needs to be changed, some things already work best in the way they already are and changing that may even be bad for productivity. So you must first find out which aspect needs to be placed on the cloud. If you are a small business without a dedicated IT department and with no resources to grow such a department, then it really makes sense to outsource your IT needs on the cloud.
  • Availability is the next question that should be asked when you have determined the computing need and are considering vendors. Will the service be available especially when you need it the most? What is their track record when it comes to availability and downtime?
  • Performance should not be left to “okay” at bestPerformance has always been an issue even when using in-house services, so why settle for less when going on the cloud? Make user that your provider is able to provide performance on top of affordability.

Below is an excellent infographic courtesy of RapidValue which highlights some interesting points for Enterprise Cloud adoption.



By Abdul Salam

Nordic Digital Business Summit – Bringing Data Center Industries Together

Nordic Digital Business Summit – Bringing Data Center Industries Together

Summit Addresses The Cloud And Internet of Things Value Chain

Recent developments in a number of Nordic & Baltic IT companies, particularly across Finland, have resulted in a vast pool of skilled IT professionals taking up new challenges and opportunities, particularly in the Internet of Things/Industrial Internet area.  At the same time we can see Nordic Data Center investments growing, fuelled by the exponential global increase of data being generated by uptake in Cloud services and the burgeoning Internet of Things industry. Traditional industries are turning to Industrial Internet & Cloud solutions to gain competitive advantage, seeking to create opportunities to combine their existing strengths with the very best in new technologies.


The Nordic Digital Business Summit was first launched in September last year, with an event that saw 600 Finnish and international attendees join in Helsinki for a one-day conference and exhibition that brought the Data Center and Digital Services industries together. Now, in 2015, the Nordic Digital Business Summit is gearing up to bring us an event that promises to deliver an outstanding line up of Nordic and international speakers across the Data Center, Cloud and IoT sectors. The event, which takes place on 24th September in Helsinki’s Kaapelitehdas, will feature two seminar areas and twin exhibition areas to allow delegates to immerse themselves in their preferred industries but also allow them to explore the other industries that are currently impacting upon the whole value chain.

anastasiaAnastasia McAvennie, NDBS Event Director, said “We can see the potential of companies in Finland and the Nordics to really drive developments in these industries so we are committed to delivering a platform for traditional industry and IT to come together as an ecosystem, to proactively learn from each other, identify business opportunities and develop international connections.   One of the key strengths of NDBS is our strategic partnership with DIGITICE Finland, whose work in these industries initiated the first event in 2014. That partnership ensures that NDBS has the full force of the Finnish national data center and digital business cluster behind us to create this international event in Helsinki.

The Nordic Data Center industry has received a significant amount of international attention recently, with large investments by companies such as Google, Facebook, Yandex and Apple. Finland’s potential for data center growth is fuelled by the availability of infrastructure that was built to support heavy industry, such as paper mills, and the skilled engineering and IT workforce who are moving into this area.

According to the Nordic research company Oxford Research in their recent publication Finland’s Giant Data Center Opportunity, “Over the next decade, the Finnish data center cluster could create an estimated 32,000 ─ 50,000 years of employment and generate a total economic impact of EUR 7 ─ 11 billion.”

Industrial Internet is also currently a high profile topic in Finland with Konecranes’ CEO Pekka Lundmark telling Kauppalehti that he believes Finland has the potential to become the “Silicon Valley of the Industrial Internet”. He went on say that “this would require a functioning ecosystem of start-ups, large companies and venture capital.”

This echoes the principals being put forward by the Nordic Digital Business Summit, which is aiming to bring a mix of large, established companies together with SMEs and innovative start-ups. NDBS is due to announce their Rising Stars campaign in May, which will make available 32 mini-exhibition spaces for young, growth companies working in fields related to the event.

The event also features a new and improved “smart networking” system that will make registration and finding new business leads a straightforward process. Anastasia said, “Rather than creating a networking tool for a day, like so many other events, we are building a community that gives our partners and delegates access to each other from the moment of registration, to get networking and set up meetings for the day of the event, then continue to network with the people they didn’t manage to speak to long after the event has finished.”

CloudTweaks recognizes the high level and tremendous standards of cloud based businesses operating in the Nordic region. We are more than happy to participate in this event and looking forward to the discovery of new and exciting technologies in the Cloud/IoT space.

Early sponsors and partners include DIGITICE Finland, Schneider Electric, The Finnish Data Center Forum, Granlund, Vattenfall, Hardware Hel, Media Grus and Ite Wiki. Further sponsors and partners will be announced regularly as the event draws nearer and we know that there are some exciting announcements to come. DIGITICE Finland takes the role of Host Sponsor this year, which means that all DIGITICE members can take advantage of significant discounts on sponsorship and exhibition packages.

Early Bird Registration is open until 30th April at a very reasonable 200€ + vat, going back up to 300€ + vat in May, so it is worth considering registration now for maximum benefit.

For further information please contact Anastasia McAvennie, Event Director, Nordic Digital Business Summit

+358 (0) 45 868 3983

ProfitBricks Makes Transitioning To Cloud Infrastructures Painless

ProfitBricks Makes Transitioning To Cloud Infrastructures Painless

Transitioning To Cloud Infrastructures Painlessly


ProfitBricks is a comprehensive IaaS provider whose goal is to make the transition to cloud infrastructures as painless as possible. On April 15th, it was announced that ProfitBricks will be launching a new DevOps Central and REST API. In combination with API features already in place, this will enable ProfitBricks to gain momentum and market share in the field of cloud infrastructure automation.

The announcement doesn’t end there. ProfitBricks is also introducing several new libraries that will greatly increase developers’ freedom to choose their own coding language, thus making it easier to integrate ProfitBricks’ services into a wider variety of existing networks. The new libraries support Python, Ruby, and Java, and several further libraries are currently in development.

achim-weissThe core of the new initiatives, said Achim Weiss, CEO and co-founder ProfitBricks, is a commitment “to providing its customers with a seamless experience, alleviating both granular and large-scale stress points in cloud migration and operations…We anticipate our expansive library launch to add a tremendous amount of value to our DevOps community, and to all of our clients.

ProfitBricks’ success to date is largely dependent on its large community of DevOps practitioners, who constantly find, read, evaluate, document, and discuss the latest projects in DevOps. The company has encouraged the growth of this community by offer a 33 percent discount to those who join the DevOps Central user community. As Weiss puts it, “It’s important that our clients have the resources available to communicate and share strategies. Not only does DevOps Central benefit ProfitBricks’ users, but it directly contributes to the DevOps community and serves its mission to spread knowledge and continuously connect development and operations.”

TORO founder and CEO David Brown commented on the developments as well, saying “This type of transparency in cloud computing is making important resources easily accessible for a community that is rapidly progressing. There’s no doubt in my mind that this will greatly benefit the DevOps community by giving DevOps pros a painless way to programmatically interact with the cloud.” TORO collaborated with ProfitBricks in creating the new libraries.

More information on these developments can be found at

About ProfitBricks 

ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Cloud Providers of 2015 by CRN and was also the recipient of two CODiE awards and a Frost & Sullivan Cloud innovation award for 2014. With offices in Berlin, Germany, San Antonio, Texas and Boston, Massachusetts, ProfitBricks can be found online at:

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security

Over the past decade, drones, also known as UAVs (unmanned aerial vehicles), have become a fact of life. Beginning as underpublicized but extremely effective items in the U.S. military’s arsenal, drones have since come into wide use by government agencies for everything from geographic surveys to law enforcement.

Now there is a significant commercial industry manufacturing drones for private use. Correspondingly, there is a growing market for unmanned aircraft of all sizes, shapes, and types among corporations, hobbyists, and other individuals. It is these commercial drones that are increasingly taking to the American skies, and that are creating growing concerns about the threat they pose to personal security.

One Person’s Snapshot Is Another’s Invasion of Privacy 


Although militaries around the world do employ weaponized UAVs, the vast majority of drones used by public agencies, corporations, and private individuals are engaged in photography and remote visual surveillance. While there are real worries about the hazards untracked, unregulated, or malfunctioning drones may pose to manned aircraft or to persons and property on the ground, by far the greatest concern is about the effect they are having on privacy.

Property boundaries, walls, fences, and even rows of trees offer no protection against photography from drones, which can hover at a medium height just beyond a property line, recording and transmitting everything that they see. Even second-story windows easily fall in a drone’s line of sight.

It is not just celebrities that are worried about paparazzi-controlled UAVs buzzing low over their Malibu mansions. Less public individuals also have real reasons to be concerned that law firms, insurance companies, private investigators, or nosy neighbors might use drones to peer into places only family and invited guests used to be able to access.

How Can Drone Security Be Established? 


Providing security against drones is a real challenge. Solutions to the threats drones pose are slowly being developed, although there is currently no foolproof protection. Indeed, even individuals who stay indoors with the shades drawn can still be tracked by infrared cameras that detect their heat signatures.

Some property owners have attempted to shoot down drones. This course of action is not particularly effective, and is liable to land the property owner in serious trouble with the law.

Another, more feasible solution is the development of electronic systems that detect the transmissions that pass back and forth between a UAV and its controller. The detector then alerts the property owner to a drone’s proximity, providing him or her with some opportunity to take cover.

More effective provisions for drone security might come from standards adopted by drone manufacturers. One possibility is that the drone manufacturing industry will incorporate navigation chips in drones that recognize areas registered on a “do not overfly list.” Property owners could register their homes on a list, and drones would be unable to pass within a certain distance of their property.

Stringent regulation of drones by local, state, and federal government would provide another measure of security for individuals, but effective statutes are still being developed. Until such laws are passed and enforced, drone security will remain a wide-open field.

(Image Source: Shutterstock)

By Glenn Blake

Thinking About Doing Business In China? Consider This…

Thinking About Doing Business In China? Consider This…

Doing Business in China? Consider This… 

China’s economy continues to outperform both regional and global markets with double-digit growth for the last decade. IDC believes China’s GDP will maintain growth around 7.2% until 2020, allowing GDP to reach US$18 trillion or 17% of the world total. And with a population of over 1.35 billion people, the country is expected to have almost twice the amount of Internet users as the U.S. and Japan by 2015.


with rapid industrial growth, is an enticing package. Just look at China’s Wuqing district: it is a modern and innovative hub located in the heart of the nation’s political and economic region that boasts five highways and a high-speed rail capable of transporting commuters to downtown Beijing in only 20 minutes.

Unfortunately, doing business in China is not always cut and dried. If you’re looking to expand your business into China, consider the following communications challenges you will have to overcome:

A lack of transparency: Visibility is one of the most important necessities in business today—specifically when partnering with a virtual private network (VPN). Many networks in the Far East fail to deliver visibility into crucial factors such as uptime, maintenance and support. For example, a company might offer 99.99 percent uptime, but the definition of “uptime” is often a grey area.

Solution: Transparency must be a primary demand before signing contracts to operate in the Chinese IT industry. Executives are highly encouraged to scour fine print when negotiating service-level agreements (SLAs). Failure to read the SLA could result in having to partner with an additional provider when expanding throughout the country or region.

Bandwidth constraints: In today’s competitive overseas market, a lack of bandwidth means missed opportunities. The market is constantly fluctuating, and businesses need to be ready to rapidly scale up or down to accommodate variations in customer volume.

Solution: Avoid the pitfall of getting caught in a bandwidth pinch before it happens. Many companies wind up having to make costly upgrades to service to accommodate spikes in business. When doing business in China, look for an IP VPN provider with flexible pricing packages and on-demand bandwidth.


Technical support challenges: In a mission-critical environment, communication needs to flow between technical support teams and business leaders without a hitch. Language barriers and a lack of 24-hour assistance often impede progress.

Solution: Make sure your VPN service provider has access to around-the-clock bilingual support as well as network monitoring solutions so you can have access to the same data as your facility’s technicians. This will ensure that when important decisions need to be made, you have access to pertinent data. Don’t let communication barriers get in the way.

Inferior network infrastructure: Despite its strong economy, China is still a developing nation. Many facilities and communications lines lack the necessary level of maintenance and operational excellence needed to ensure data transmissions. Be wary of companies that do not actively maintain submarine cables and data center infrastructure. 

Solution: Your VPN partner should be able to guarantee uninterrupted service with fully redundant backbone at all times. Before agreeing to partner with a VPN, make sure that the company will perform routine updates and maintenance without affecting your uptime. You should also be provided with a complete map of connectivity routes throughout the region so you always know how your data is getting from point to point. Make sure the VPN you partner with has multiple PoPs spread throughout the country and diverse connectivity routes throughout the APAC region. Communication needs to be seamless across your global network.

(Image Source: Shutterstock)

By Chi Tat Yan, Vice President, China Business, Pacnet

pacenet-CT-YanBased in Hong Kong, Chi Tat Yan is responsible for driving revenue and sales of services in China by helping customers outside of the country to expand their business in the market. Prior to his current role, Mr. Yan was Chief Operating Officer of Pacnet Business Solutions (PBS), Pacnet’s Joint Venture in China, since 2009. Before joining PBS, he was Senior Director, Marketing and Sales at Pacific Internet (HK) Ltd for eight years managing the company’s sales and marketing operations in Hong Kong. Mr. Yan has more than 15 years of telecommunications experience and built a solid record in sales and channel management in Hong Kong and China. He holds an MBA from the Hong Kong University of Science and Technology.

Tips For Data Security In The Cloud

Tips For Data Security In The Cloud

Security In The Cloud

How can you be completely confident that the information you are storing or have already stored in the cloud is safe? The answer to this is — you can’t. However, you can adopt certain protective measures that will surely help find the answer. In this article, I have listed some approaches that can be followed to secure your data, access and network in the cloud.

Secure access control to your data in the cloud

Access control is usually made up of two parts:

1) Authentication: At this phase, only those users are given authority who they claim to be. This verification is possible through password checking.

2) Authorization: It gives access to no matter what authenticated user is authorised to. The first and foremost step is to achieve security in the cloud by knowing who’s accessing what. All people working inside your organisation i.e., database administrators and employees will obtain an advanced stage of scrutiny; receive training on firmly managing data; and come up with a stronger access control.

Also, limit the data access control according to the user context. Through this, you can achieve the change in level of accessing data in the cloud depending upon where the user is and what device is he/she been using.

Take a risk-based approach to secure assets: A risk-based approach to secure assets means adopting pro-active measures by interconnecting otherwise silo-based security and IT tools, continuously monitoring and assessing the data. In turn, the organisation can achieve a closed-loop and automated remediation process that is based on risk. Risk-based approach comes up with three major elements: continuous compliance, continuous (security) monitoring, and closed-loop, risk-based remediation.

  • Continuous compliance:

It involves reconciliation of assets along with automation of data classification, alignment of technical controls, automation of compliance testing, deployment of assessment surveys, and automation of data consolidation. When any organisation conducts continuous compliance, it helps in reducing overlap by leveraging a common control framework, increases accuracy in data collection and data analysis, and reduces redundant as well as manual, labour-intensive efforts by up to 75 per cent.

  • Continuous (security) monitoring:

It comes up with an increased frequency of data assessments particularly on a weekly basis and requires security data automation by aggregating and normalising data from a variety of sources such as SIEM, asset management, threat feeds, and vulnerability scanners. In turn, organisations can reduce costs by unifying solutions, streamlining processes, creating situational awareness to expose exploits and threats in a time-bound manner, and gathering historic trend data for the predictive security.

  • Closed-loop, risk-based remediation:

A closed-loop, risk-based remediation process involves asset classification to define business criticality, continuous scoring to enable risk-based prioritisation, and closed-loop tracking and measurement. This process results in dramatically increase in operational efficiency, improves collaboration between businesses, security, and IT operations, and enables organisations to measure security efforts and make them tangible.

All these approaches identify databases by means of extremely sensitive or valuable data, and take care by providing extra protection, encryption and monitoring around them. Implementing these approaches within your organisation, you will be capable of protecting all essential systems as well as assets from the attack. You can even authorise the access to infrastructure and data.

Extend security to the device:


Shoulder-to-shoulder with access limitation, your data calls for the variable levels of protection. Organisations holding sensitive data should be protected by making use of encryption along with the additional monitoring. Encryption can provide you relief from the interference problems caused by illegal users. In the same manner, personal devices that are used for accessing cloud data should bring forth the corporate data isolation. These devices should make full use of Patch Management Software that keep programs up-to-date and scan all mobile applications from any kind of vulnerabilities.

Add intelligence to network protection:

Network protection devices should have the ability to deliver additional control analytics and have an insight control through which the check can be made on which users are accessing what content and applications. This will serve as a helping hand in assembling the intelligence that is required to see patterns even in the chaos.

Adding intelligence to network mitigates the risks with real-time situation awareness of network activity and critical transparency to allay fears of potential customers. You can protect network by hardening network security to restrict data leakage or data theft. You can also audit trails of all network transaction — communication and content — related to a customer’s account, assuming compliance to regulation and standards.

Establish ability to see through the cloud:


Security devices, like those used for verifying users IDs and passwords, for acquiring security data to create audit trail are needed for monitoring compliance and forensic investigation. The basic idea behind all is to find out essential and meaningful signals regarding a possible attack or security risk in the briny deep sea of data points.

Adding a security intelligence layer i.e., layer of advanced analytics helps in bringing about all of security data together. This helps in providing a real-time visibility into both the data centre as well as the cloud infrastructure.


Along with the above mentioned approaches, there are many others that a business can take into consideration in order to strengthen their data protection policy. Regular evaluation of your business security policies will ensure you are not leaving an “open door” for hackers to enter. Security plays a vital role in cloud deployments. By following these approaches, an organisation can be managed more efficiently, for these will completely protect data as well as devices in the cloud.

By Sudhi Seshachala

CloudTweaks Comics
Cloud Infographic: Security And DDoS

Cloud Infographic: Security And DDoS

Security, Security, Security!! Get use to it as we’ll be hearing more and more of this in the coming years. Collaborative security efforts from around the world must start as sometimes it feels there is a sense of Fait Accompli, that it’s simply too late to feel safe in this digital age. We may not…

Update: Timeline of the Massive DDoS DYN Attacks

Update: Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

Security and the Potential of 2 Billion Device Failures

Security and the Potential of 2 Billion Device Failures

IoT Device Failures I have, over the past three years, posted a number of Internet of Things (and the broader NIST-defined Cyber Physical Systems) conversations and topics. I have talked about drones, wearables and many other aspects of the Internet of Things. One of the integration problems has been the number of protocols the various…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…


Sponsored Partners