Category Archives: News

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law To Safeguard Its Cyberspace Sovereignty

China Drafts New Law State media in China today revealed that its parliament has published a draft law that will “safeguard national cyberspace sovereignty,” as well as “security and development.” It is widely agreed that once accepted, the new law will consolidate government control over digital data and consequently have significant consequences for international and…

Data Violations – Record Year For Data Breaches

Data Violations – Record Year For Data Breaches

Record Year For Data Breaches The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and last month Ars Technica discussed in detail the information breach at the U.S. Government’s Office of Personnel Management. MSPmentor‘s current IT security news includes the…

Pentagon, FBI And NSA Train US And British Officials For Cyber War

Pentagon, FBI And NSA Train US And British Officials For Cyber War

Officials Train For Cyber War Banking and energy officials joined members of the Pentagon, National Security Agency (NSA) and the Department of Homeland Security for a three-week cyber war game in Suffolk, Virginia last month. The exercise was designed to train US and British officials and military personnel, as well as several key-companies, for inevitable large-scale cyber…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Announces Intent to Acquire OpenDNS Acquisition to Accelerate Cisco’s Cloud Delivered Security Portfolio SAN JOSE, Calif. – June 30, 2015 – Today, Cisco announced its intent to acquire OpenDNS, a privately held security company based in San Francisco. OpenDNS provides advanced threat protection for any device, anywhere, anytime. The acquisition will boost Cisco’s Security…

Cyber Security Is BIG Business

Cyber Security Is BIG Business

Cyber Security Investments Are Growing Cyber Security shares on Wall Street are soaring as hackers continue to crack into the cyber defense systems set up by government agencies, banks and retailers. Ongoing high-profile breaches have led to larger-than-life share increases of numerous US companies, as well as the exponential growth of a “passive investment” fund…

What Don’t You Know About Your Cloud?

What Don’t You Know About Your Cloud?

Looking Under The Hood Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels like you barely know them at all. You’re right In many ways it’s…

Google Cloud Source Repository

Google Cloud Source Repository

Google hasn’t announced it yet, but the company earlier this year started offering free beta access to Cloud Source Repositories, a new service for storing and editing code on the ever-expanding Google Cloud Platform. It won’t be easy for Google to quickly steal business from source code repository hosting companies like GitHub and Atlassian (with Bitbucket).…

Social Media A New Military Battleground

Social Media A New Military Battleground

Social Media Warfare As an increasing number of militaries worldwide use social media to recruit soldiers, gather intelligence, spread propaganda and even communicate with their own and other military groups, the broad spectrum of social media has been identified as the newest international military battleground. And as the battle intensifies, more countries join in. Earlier…

Tech Company Finds Stolen Government Log-ins All Over Web

Tech Company Finds Stolen Government Log-ins All Over Web

WASHINGTON (AP) — A CIA-backed technology company has found logins and passwords for 47 government agencies strewn across the Web — available for hackers, spies and thieves. Recorded Future, a social media data mining firm backed by the CIA’s venture capital arm, says in a report that login credentials for nearly every federal agency have…

Wearable Sensors Reduce Risk of Pregnancy Complications For Moms And Babies

Wearable Sensors Reduce Risk of Pregnancy Complications For Moms And Babies

Wearable Sensors Reduce Risk of Pregnancy Complications Pregnancy should be a happy time, but lifestyle-related pregnancy complications are on the increase, and an alarming number of mothers and babies die each year during pregnancy and childbirth. As a result, four scientists have evaluated the use of wearable sensors to motivate healthier lifestyle behavior during pregnancy…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising