Author Archives: CloudTweaks

4 Services That Can Help Prevent Email Snooping

4 Services That Can Help Prevent Email Snooping

Prevent Email Snooping

Email security and privacy concerns have been an ongoing problem. The confidence of logging into your favorite email program without any concerns of prying eyes, is long gone. The good news is that there are a few well known services on the market that can help restore a bit of that confidence. Provided is a small list of some of the more talked about services on the market.


ProtonMail was developed by Andy Yen, a PhD student at CERN in Switzerland, who became concerned about the NSA spying on the emails of scientists and other private citizens. He and some of the other young students at CERN got together to develop an end-to-end encryption system that the NSA couldn’t get into.

We encrypt the data on the browser before it comes to the server,” he explains. “By the time the data comes to the server it’s already encrypted, so if someone comes to us and says we’d like to read the emails of this person, all we can say is we have the encrypted data but we’re sorry we don’t have the encryption key and we can’t give you the encryption key.”

Most of ProtonMail’s team works on the project part-time. “We’re all CERN or MIT scientists,” says Yen, “so we’re doing research on computing, mathematics, physics that’s actually closely related to what we do on the secure email. Encryption is very mathematical so we have four PhD physicists working on this.”

A recent article by The Register highlights a potential security flaw in ProtonMail, though. A security researcher managed to hack into the system and plant dummy code intended to represent a potential virus. He was not able to crack the encryption or read emails, but he did manage to get his code into user’s systems, thus demonstrating a security flaw. ProtonMail claims to have patched the security flaw and says that this is no longer an issue.


Countermail is a Swedish service that claims to be the only reliable protector against MitM (Man in the Middle) attacks, in which an attacker impersonates the communication service itself and thus gets access to all messages. Qualsys’s SSL lab gives Countermail an overall grade of “A,” and so far no major hacks or security flaws have been detected. The service charges $19.99 for a three-month subscription, or $99 for a full year.

The main criticism of Coutnermail is not a security flaw, but a potential user error that the service does not prepare for. This is loss of password. In a widely-read review of Countermail, advises readers to “Be very careful to remember your password because if you lose it, it can not be recovered and your data will be lost for ever.


CryptoHeaven dubs itself as the “world’s safest email“. It offers a “no-knowledge” security solution, meaning users maintain their own keys and nothing readable is stored on the service’s own servers. That means that even if CryptoHeaven itself is compromised, its users can still be confident in the security of their communications. As a private reviewer comments, “When you first run the client, you create an RSA key pair and set the key length & prime certainty. The private RSA key is then encrypted with what CryptoHeaven calls your passcode, a hashed and salted output of your username & password…That sounds like a lot of win!” The service is also set apart by the fact that it offers an entire communications suite (instant messenger, voice mail, etc.) in addition to its email client.

Another point in Cryptoheaven’s favor is its location in Toronto, Canada. The Canadian government is not aggressive with its spying program (unlike the United States and a few European governments), and so this server location is protected by international boundaries – although this could change at any moment, as many governments are ramping up their spying efforts and the US government has a documented history of extending its spying program internationally.


Enigmail is not an email service as such, but rather a plugin for SeaMonkey and Mozilla Thunderbird. It encrypts data sent through these mail services using a GNU Privacy Guard. Launched in 2001, it is a widely used open-source security solution. Users have a private, password-protected decryption key that they can share with as many or as few of their contacts as they wish. This reliably keeps third-party viewers from getting into the email.

Significantly, a report by the Freedom of the Press Foundation found that encryption was one of the only reliable ways to prevent NSA spies from accessing email. They went on to specify Enigmail as one of the more reliable and user-friendly encryption products on the market for this purpose.

By Gustav Steinhardt

Top 5 Big Data Misconceptions – A Lighter Look

Top 5 Big Data Misconceptions – A Lighter Look

Big Data Misconceptions

We have decided to take a look back at our comic library and compile a list of our favorite Top 5 Big Data related comics over the past 5 years. Many of our long-term loyal readers have enjoyed these, while some of our newer followers can now partake in series of archived comic illustrations by our cartoonists – David Fletcher and Al Johnson.





Minimizing Downtime During Mergers & Acquisitions

Minimizing Downtime During Mergers & Acquisitions

Minimizing Downtime

As economic conditions gradually improve, North American companies are starting to recover their confidence, and are looking beyond mere survival. A recent survey by KPMG focusing on mergers and acquisitions demonstrated cautious optimism, with 21 per cent of companies planning to initiate at least one acquisition this year, and 16 per cent planning for at least two.

The survey outlines a number of criteria that companies would seek before feeling confident enough to initiate an acquisition. The single most important factor, according to 38% of respondents, was a well-executed integration plan, and it is in this respect that cloud-based phone service can provide significant benefits during the often-frenzied transition process.


Importance of Reliability and Continuity

During a merger or acquisition, reliability and continuity of communications are key. Onsite systems cannot provide the same level of redundancy as a cloud-based service because they are by nature confined to a single physical location. Cloud-base phone service offers a continent-wide network of independent data centers, delivering redundancy improved by orders of magnitude. If your company has a legacy communications system, and is on the verge of becoming an acquirer (or acquire-e), try to position the move to the cloud underway now.

Merging Multiple Locations

What about a scenario in which the company has multiple physical locations, all of which must be merged into a unified service plan under a new corporate umbrella? Cloud-based providers use the concept of “locations,” and each account can have multiple locations under it. All extensions within the account can directly call each other, with no need to dial outside numbers and no long-distance costs. Physical location becomes irrelevant under such a scheme; the service sees all extensions as “belonging” to the same entity. Managers can then view and control all extensions from a single, intuitive web portal.

Staff may also change roles as part of a merger or acquisition, or even shift from one physical location to another. During that transition time, client service must continue to operate in a responsive manner, and call queues are an excellent tool. These structures allow managers to assign any number of agents – again, regardless of their physical location – to a given queue, such as Sales, Support or Billing. If an agent in the queue isn’t available during the transition period, the call will roll to alternative agents, with options to continue ringing into different queues or even to outside devices such as smartphones.

Streamline Processes Post Merger

Looking ahead to the period immediately after a transition, it is often the case that new management searches for ways to streamline company processes and workflow. Cloud-based service offers a solution set that can be closely tailored to the industry or niche in question. The KPMG survey reveals that some of the primary targets for acquisition include companies in the technology, media and healthcare. Taking these verticals as examples, cloud-based phone service provides direct smartphone integration, for technology professionals who are rarely tied to a desk, offer on-demand, large-scale conference call solutions for media companies discussing PR strategies with clients and allow for HIPAA-automatic compliant call recordings at healthcare offices.
Growth-oriented companies know that there are already enough moving pieces to worry about in an acquisition or merger. Ensuring that communications systems are built for the company’s needs – both immediate and foreseeable – is just good business.

adam-simpsonBy Adam Simpson

Adam is the CEO and co-founder of Easy Office Phone where he oversees the creation of new sales channels including a North American Dealer Program, plays a leading role in software development, manages the company’s network infrastructure, and builds dedicated teams of sales, support and engineering staff. Under Simpson’s leadership, Easy Office Phone has grown rapidly and steadily into a highly respected provider of Hosted PBX service to clients throughout Canada and North America since its launch in 2005.

Smart Cities: Market Opportunities Worth USD 1.5 trillion By 2020

Smart Cities: Market Opportunities Worth USD 1.5 trillion By 2020

Smart Cities: Market Opportunities Worth USD 1.5 trillion By 2020

SINGAPORE, Nov. 7, 2014 /PRNewswire/ — By 2025, it is expected that approximately 58% of the world’s population – or 4.6 billion people will be living in urban areas. The process of urbanization has become so important that it has become a catalyst in the transformation of major cities to smart cities, including Barcelona, New York and Amsterdam.

Through the convergence of industries, smart cities are expected to present market opportunities worth USD 1.5 trillion by 2020, with the Smart Governance and Smart Education segments to have the greatest spending. This convergence of technology will also lead to the convergence of competition, with companies with multiple business interests to benefit most.

There are 8 key elements that define a Smart City: Smart Governance, Smart Building, Smart Healthcare, Smart Mobility, Smart Infrastructure, Smart Technology, Smart Energy and Smart Citizens.

By 2025, it is estimated that there will be over 26 Smart Cities featuring at least 5 of the 8 mentioned elements; with more than 50% located in North America and Europe.

One key characteristic of smart cities is the efficiency underlying the various aspects that help it run more effectively, be it Energy, Infrastructure and Healthcare. For example, the implementation of eHealth and mHealth systems is being encouraged for better and smarter healthcare management.

However, cost and existing infrastructure remain the key factors influencing the development of smart cities. Most smart cities initiatives are currently being funded by special development funds as well as public-private sector partnerships.

With the unique challenge of balancing the needs of the various stakeholders, it is expected that governments will take the lead in guiding the transformation of smart cities. For a smart city to be successful there is a necessity to adopt a structured approach, focusing on open collaboration and infrastructure.

Smart Energy

Smart cities will leverage several new technologies that are likely to alter the city-based utility landscape.

Through the application of technology in areas such as energy recovery from waste and managing energy efficiency, the focus for smart energy will remain on transforming the power grid.” says Ravi Krishnaswamy, Vice-President, Energy & Environment Practice, Frost & Sullivan Asia Pacific.

To meet this demand and differentiate themselves, utility companies will look to tailor their various new service packages for their customers.

Smart Technology

The Internet of Things (IoT) is also anticipated to be a key technological driver for smart cities, where ‘fun’ meets ‘function’. Implementation of devices or processes such as low cost sensors, cloud computing, advanced data analytics and mobility are expected to aid the transition to a seamless living experience on a large scale. Examples of cities which have successfully implemented Smart city technologies include Santander in Spain.

In smart cities, the combination of IoT and Cloud Technology is expected to spur the creation of an entire cloud-based ecosystem serving stakeholders such as end-users and innovators. However, cloud security will remain one of the key challenges faced,” noted Andrew Milroy, Senior Vice-President, ICT Practice, Frost & Sullivan Asia Pacific.

Smart Healthcare

Although technology is expected to have a positive impact in the healthcare sector through the reduction of labor and operational costs, the healthcare services in smart cities will remain challenged by the scarcity of suitable resources.

The application of technology such as telehealth, mobile and digital health will give rise to smart healthcare cities, where the focus will be on improving the operating efficiency and achieving cost savings while maintaining quality,” says Dr. Milind Sabnis, Director, Healthcare Practice, Frost & Sullivan Asia Pacific.

Frost & Sullivan GIL Executive Briefings

Frost & Sullivan held its GIL Executive Briefing: SMART CITIES – A $1.5 TRILLION MARKET OPPORTUNITY, on 7 November, 2014 in Singapore. GIL Executive briefings on various topics are held across Asia Pacific countries. If you are interested to attend any of the briefings, please send an email to

About Frost & Sullivan

Frost & Sullivan, the Growth Partnership Company, works in collaboration with clients to leverage visionary innovation that addresses the global challenges and related growth opportunities that will make or break today’s market participants. For more than 50 years, we have been developing growth strategies for the global 1000, emerging businesses, the public sector and the investment community. Is your organization prepared for the next profound wave of industry convergence, disruptive technologies, increasing competitive intensity, Mega Trends, breakthrough best practices, changing customer dynamics and emerging economies? Contact us: Start the discussion

SOURCE Frost & Sullivan

Pinup: Lunacloud Shows Promise

Pinup: Lunacloud Shows Promise

The Next Cloud Contender?

Lunacloud is a European cloud computing provider and a major player in the IaaS (Infrastructure as a Service) market.

Founded in 2011, it has rapidly expanded into this dynamic industry and become a prominent competitor. Most people in the industry were unaware of Lunacloud until December of 2012, when a CloudSpecs performance report showed that Lunacloud outperformed Amazon and Rackspace in RAM performance, DISK performance, and CPU performance. Lunacloud earned a score of 100 (on a scale of 100), while its high-profile competitors scored, on average only 26-40. It was also found to have a total throughput that was more stable than Amazon and roughly twice as fast as Rackspace. All these findings were made even more significant by the fact that Lunacloud is cheaper, in standard configurations, than either of the tested competitors, and this has led many observers to be optimistic about Lunacloud’s chances for future success. Last week, the company has announced a unique offer in the cloud industry, offering for free 1TB external traffic to its cloud servers and 2 free public IP’s per subscription.

Analysts are now projecting that Lunacloud will be one of the major players in the cloud computing industry, both in the areas of IaaS (Infrastructure as a Service) and PaaS (Platform as a Service).

Today, Lunacloud has operational bases in 5 countries (soon to be 6), and provides services to an additional 63 countries. In addition to its central cloud nodes in Lisbon, Paris, and Moscow (earlier 2015), it also has branch locations in Lisbon, London, Barcelona, Paris and Moscow. Its international reach is made possible by a customer service network that operates simultaneously in English, French, Spanish, Portuguese, and Russian.


Lunacloud’s major market differentiator is its hourly price policy for cloud servers. Rather than charging a flat annual or monthly rate, the company offers clients the flexibility of an hourly rate without long-term contracts. Hourly rates are placed on a sliding scale based on the specific needs of the client, who has the option to customize the server’s RAM, CPU, and DISK resources as well as its operating system. In general, these hourly rates, calculated across the full period of use, add up to less than the average flat-rate cost for the same service, meaning most clients report that they save money with the hourly rate. Lunacloud also allows seeks to set itself apart by giving its customers full, autonomous control over scaling.

Cloud Servers, however, are just one branch of Lunacloud’s services. The company also offers Cloud Storage and Cloud Jelastic services. The cloud storage branch is fairly straightforward, offering a sliding-scale price based on GB/month and other storage specifications. Analogous to other cloud storage services, Lunacloud’s storage is a basic service for persistent object storage, S3-Compatible

The Cloud Jelastic branch of Lunacloud’s services targets developers and allows them to leave infrastructure management in someone else’s hands so that they con focus on developing their applications. The available infrastructures are highly adaptable based on the client’s specific needs, allowing Lunacloud to reach a broader range of potential customers. Cloud Jelastic’s latest version includes support for multiple nodes of different stacks, automatic horizontal scaling of app servers, and Marketplace expansion. Python and Node.js hosting also introduced to enhance Jelastic’s multi-language PaaS capabilities. The polyglot platform also supports popular programming languages, Java, PHP, and Ruby (.NET will be available soon).

By Gustav Steinhardt

Cloud Infographic – IOT And The Massive Potential

Cloud Infographic – IOT And The Massive Potential

IOT And The Massive Potential

Internet of Things (IOT) has been discussed often on CloudTweaks and for good reason.  It provides a number of tremendously exciting new opportunities for many businesses. For those not exactly familiar with the term can easily find a quick refresher infographic here.

As for the potential of the Internet of Things, Gartner and IDC both predict incredible market growth over the next several years.

According to research from International Data Corporation (IDC): “A transformation is underway that will see the worldwide market for IoT solutions grow from $1.9 trillion in 2013 to $7.1 trillion in 2020. IDC defines the Internet of Things as a network of networks of uniquely identifiable endpoints (or “things”) that communicate without human interaction using IP connectivity – be it “locally” or globally.”

Gartner estimates that: “IoT will include 26 billion units installed by 2020, and by that time, IoT product and service suppliers will generate incremental revenue exceeding $300 billion, mostly in services.”

Attached is an infographic by Datastax outlining some of the interesting methods in which IOT can be applied.


The New ‘Virtual’ Reality

The New ‘Virtual’ Reality

Juniper Gives Service Providers Flexibility to Innovate, Launch, Test and Rethink New Services in Record Time and for Far Less Investment

SUNNYVALE, CA–(Marketwired – Nov 6, 2014) – (NYSE: JNPR) — A sales rep of a major Internet service provider picks up the phone and connects with the CEO of a hot new startup. The rep is tasked to get the company’s Internet up and running, but he’s hundreds of miles away.

After some back-and-forth with the CEO, he determines the startup needs more than basic Internet for its 100 employees — it also needs cloud-based unified communications, payroll and inventory management, and guaranteed quality video streaming. The sales rep takes out his tablet, pokes at a few buttons and delivers a quote to the CEO. Liking what he sees, the CEO gives the sales rep the order.

So, I guess we’ll be good to go in about three months?” asks the CEO.

Nope,” the salesman said, “everything’s actually up and running right now.”

Such can be the future of the service provider business: custom services programmed on-demand with mouse rolls, not truck rolls. For years, providers have been spending billions beefing up their physical network infrastructure to support, for instance, the increased bandwidth demand for over-the-top (OTT) content from the likes of Netflix, Facebook and Amazon. The providers are making the investment, but the vast majority of the revenue is going to the OTT companies.

However, network agility does not meet business agility. With today’s pace of business, it’s simply impractical to wait sixty days for a particular service to come online. Something has to change. Service providers can no longer keep designing networks the same way they have for the past two decades and expect to be around for another two. And when OTT players are eating your lunch, it’s time for service providers to think differently about their business models in order to stay viable.

Enter the new era of virtualization. Infrastructure can be flexibly deployed when and where needed and then elastically scaled out, up, or down upon demand. Rather than spending time testing and qualifying new equipment and training on multiple appliances and operating systems, virtualization enables service providers to seamlessly and affordably roll out new, revenue-generating services such as virtual security, multicast video or managed cloud services — in minutes, not months.

With Juniper Networks’ (NYSE: JNPR) announcement today that it is virtualizing its No. 1 selling MX router platform, service providers can introduce virtualization into their network at their own pace, worry-free and without expensive qualification-testing, operations integration and training on new equipment. Juniper Networks® vMX operates consistently in feature and functions as the MX router platform, so that businesses can work more autonomously from day one. Adding new services is as simple as checking a box.

Some of the challenges facing providers of network services today are that resource and capacity planning is static, installation intervals are months vs. days or hours, and the network is not flexible enough to rapidly deploy new services to respond to ever changing market demands,” said Nav Chander, research manager of IDC’s Worldwide Telecom division. “Service providers that deploy programmable platforms that leverage network virtualization for scale, automation and faster service creation will have more flexibility to enter new markets, increase customer satisfaction and profitability.”

Additionally, no two customers are alike in their connectivity needs so routine maintenance or service deployments can often mean network downtime for every customer running off a service provider’s hardware. Service providers can now simply spin a vMX up on an x86 server and carry out the service upgrade there. Just because one customer wants video-service enhancement, for instance, doesn’t mean everyone else has to wait for it to be done.

Let’s take for example a regional service provider that wants to stretch connectivity into a local strip mall. Normally, with just physical routing, that would take weeks, expensive new hardware and extra manpower. With a vMX, setting up shop is as simple as flipping on a light switch.

The service provider network is now no longer a “field of dreams,” so to speak, where “if you build it they will come.” Sorry, Kevin Costner. Providers won’t need to spend hundreds of thousands of dollars on extra capacity and wait (read: hope) for the customers to show up. With a vMX, a carrier can start small and react more quickly to increased demand. What does low initial cost and fast deployment time mean? The ability to succeed quickly or fail fast. More experimenting. Less uncertainty. If demand doesn’t increase, investments can be repurposed for other uses.

Another scenario: a service provider just won a project to provide Internet and services to a huge, national company. The provider can already reach 75 percent of the enterprise’s facilities with its current network infrastructure, but there’s a nagging extra bit remaining. In the old model, they would have to buy a whole new router, set up new facilities to cover that extra quarter and overprovision assuming the service was successful. With a vMX, the provider can leverage the cloud model and push “go” to scale out to cover everything its customer needs.

The vMX can also work in tandem with physical MX routers. Every one of Juniper’s service provider customer markets are different, where some situations call for physical routing, for others virtual makes more sense. Since all of Juniper’s routing platforms run on Junos® OS with a common function and feature set, carriers already using the MX platform won’t have any trouble integrating a vMX into their lineup.

Now service providers have the maximum flexibility to use the right tool for the right project. No more having to use a hammer to try to turn a screw.

It’s through innovation like this that Juniper is ushering in the next generation of service provider networks, capable of responding to end-user demand in a mere fraction of the time and operational cost it previously took. Virtualization is the key to service providers transforming both their business and the networks on which they run.

And as a bonus, the vMX can fit on a thumb drive.thumb-drive

About Juniper Networks in Routing

Juniper Networks was born from a willingness to challenge conventional thinking. Our routing solutions are the result of some of the industry’s most groundbreaking innovations across every aspect of networking technology: in silicon, systems and software. They continue to be the industry benchmark for performance, scale and rapid services deployment, giving customers a competitive advantage as they set out to build the best networks on the planet.

About Juniper Networks

Juniper Networks (NYSE: JNPR) delivers innovation across routing, switching and security. From the network core down to consumer devices, Juniper Networks’ innovations in software, silicon and systems transform the experience and economics of networking. Additional information can be found at Juniper Networks ( or connect with Juniper on Twitter and Facebook.

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier

The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to identity theft and attacks on financial data, attackers are coming from all angles with a dizzying array of tools and objectives. As wearable technology and the Internet of Things come more and more into the mainstream, the proliferation of “hackable” objects will create an even greater security challenge.

One of the areas likely to be hardest hit is energy production. Energy providers were victimized by hundreds of attacks over the past several years, and the cost of these attacks is steadily mounting. Such attacks can be extremely dangerous, as an attack on a power plant may override crucial safety systems and create dangerous conditions within the plant.

In response to these challenges, the UK, US, and EU governments are partnering with private business to develop security solutions (both policy-based and technology-based) that will stem the tide of cyber attacks. Just as no law enforcement system can prevent all robberies, no cyber security regime will ever completely end the threat of cyber attacks, but through cooperation and innovation we can stay one step ahead of the attackers.

Infographic provided by WhoIsHostingThis



By Gustav Steinhardt

CloudTweaks Comics
Security and the Potential of 2 Billion Device Failures

Security and the Potential of 2 Billion Device Failures

IoT Device Failures I have, over the past three years, posted a number of Internet of Things (and the broader NIST-defined Cyber Physical Systems) conversations and topics. I have talked about drones, wearables and many other aspects of the Internet of Things. One of the integration problems has been the number of protocols the various…

A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…


Sponsored Partners