Category Archives: News

Keeping Ahead Of Organized Online Crime

Keeping Ahead Of Organized Online Crime

Organized Online Crime LastPass, one of the top password managers available, released a statement last week that suspicious activity had been discovered and blocked on their network. It appears that no encrypted user data was stolen, but email addresses, password reminders, server per user salts, and authentication hashes were compromised. LastPass is now providing additional…

IBM’s Bluemix Adopted By Capgemini’s Sogeti

IBM’s Bluemix Adopted By Capgemini’s Sogeti

IBM Bluemix Today, June 18, Capgemini’s Sogeti revealed that it is implementing IBM’s cloud PaaS Bluemix as its global development platform. Damion Heredia, IBM Vice President of Cloud Platform Services, told CloudTweaks, “We are very focused on growing our ecosystem of partners that help clients through the adoption of cloud. We are excited that Sogeti…

The Invasion Of Privacy And The NSA

The Invasion Of Privacy And The NSA

e Invasion Of Privacy Recently, the US Justice Department has told a federal magistrate judge that two government agencies are investigating allegations of misconduct during the Thomas Drake – National Security Agency (NSA) leak investigation in 2010. They are the Office of Special Counsel, a federal agency that is responsible for investigating complaints by whistleblowers,…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Educating To Create Global Innovation

Educating To Create Global Innovation

Global Innovation China, which is seen by many as one of the biggest espionage threats to cyber security in the US, is back-stepping and changing its attitude to global commerce. This is the opinion of Condoleezza Rice, former US secretary of State who says China previously had a plan to use the Chinese multinational networking…

Networks Can Be Used As Sensors To Enforce Security

Networks Can Be Used As Sensors To Enforce Security

Network Sensors & Security Enforcement As Cisco Live 2015 launched in California this week, a primary message the company sent out was that it is critical to lock out cybercriminals. But as methods of attack become increasingly sophisticated, and points of infiltration multiply, traditional methods of security are not enough. So instead of seeing computer networks as…

Equinix Partners With Aliyun To Provide New Cloud Service

Equinix Partners With Aliyun To Provide New Cloud Service

Equinix Partners With Aliyun US data center and global interconnection company, Equinix, Inc. and Chinese cloud computing business, Aliyun today signed an agreement that will enable Chinese and North American enterprises to do business between China and North America via the cloud. According to a statement released this morning, the agreement will enable Asian and…

3D Printing Rising Expectations

3D Printing Rising Expectations

3D Printing Industry  3D printing is on the rise, with Gartner predicting worldwide shipments of 3D printers to reach 217,350 units in 2015, and then 2.3m by 2018. It is also expected that by the end of 2016 at least three of the big printer makers in the market will have their own branded 3D printers.…

Could Your Business Survive If Your Office Space Didn’t?

Could Your Business Survive If Your Office Space Didn’t?

Could Your Business Survive? Hurricane season is upon us once more. With the Pacific season starting back in April and the Atlantic season following in June, businesses near the coast are at higher risk for suffering hurricane effects. And although there is no stopping Mother Nature, there are ways to protect your business with cloud-based…

Cybercrime Internet Security Report

Cybercrime Internet Security Report

Cybercrime You Must Prepare For Monitoring threat activities in over 157 countries and territories, and using 57.6 million attack sensors, Symantec has composed their comprehensive Internet Security Threat Report. With the constantly changing threat landscape including malicious code and files held for ransom, organizations must understand these serious threats and be aware of vulnerabilities. Symantec…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising