Category Archives: News

Blocking The Cloud – Ad Blocking Profits & Pitfalls

Blocking The Cloud – Ad Blocking Profits & Pitfalls

Ad Blocking Profits & Pitfalls A German court recently ruled that ad blocking software is legal, with Adblock Plus beating out Die Zeit and Handelsblatt claims that their plug-in is anti-competitive. While ad blocking does cause considerable strain for online publishers and marketers, Adblock has encouraged advertisers and content creators to work with them to…

Veracode Recognized as a “Leader” in Gartner Magic Quadrant for Application Security Testing

Veracode Recognized as a “Leader” in Gartner Magic Quadrant for Application Security Testing

 Veracode Well-Known for Its Scalable Cloud-Based Service, Ongoing Innovation and Expertise BURLINGTON, MA–(Marketwired – Aug 10, 2015) – Veracode, a leader in protecting enterprises from today’s pervasive web and mobile application threats, today announced that it has been positioned in the “Leaders” quadrant of Gartner Inc.’s 2015 “Application Security Testing Magic Quadrant1” for the third…

Adobe Releases Another Security Update For The Dying Flash

Adobe Releases Another Security Update For The Dying Flash

Growing Security Concerns Surrounding Adobe Flash  Adobe has today released yet another security update for Adobe Flash Player. Aimed at Flash developers, the update is the 12th since the beginning of 2015, and follows recent pleas from Facebook’s newly appointed chief security officer (CSO) Alex Stamos to discontinue Flash as soon as possible, because it…

Cyber Breach Much Worse Than Reported

Cyber Breach Much Worse Than Reported

US Government OPM Cyber Breach Much Worse Than Reported The much publicized breach at the US government Office of Personnel Management (OPM) in May this year was much more serious than initially reported, in terms of the number of people affected, the quality of information breached, as well as the probable cost to American taxpayers.…

Controversial Cybersecurity Bill A Threat To Privacy

Controversial Cybersecurity Bill A Threat To Privacy

Controversial Cybersecurity Bill As the US Senate prepares to vote on the controversial Cybersecurity Information Sharing Act just days before the August recess, the Department of Homeland Security (DHS) has warned that the privacy of US citizens and organizations may be compromised. The DHS has also warned that the proposed legislation might slow down response…

General Electric’s Predix Cloud – Building IoT Applications

General Electric’s Predix Cloud – Building IoT Applications

General Electric’s Predix Cloud This week, General Electric has launched its first hosted cloud service. Designed for building applications for the Internet of Things, GE has differentiated itself from market-dominating services such as Amazon’s AWS by targeting the industrial market, and will be focusing on applications related to medical equipment, jet engines, wind turbines, and…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereignty regulations SUNNYVALE, Calif., July 30, 2015 – Blue Coat Systems, Inc., a market leader in enterprise security, today announced it has acquired Perspecsys, Inc., a leader in enterprise cloud data protection…

Global Leaders In Malware And Malicious C2 Traffic

Global Leaders In Malware And Malicious C2 Traffic

Malware and Malicious C2 Traffic Nearly half of all malware threats in the past three months originated in the US, while both the US and China are global leaders when it comes to malicious command and control (C2) traffic. This was revealed in the latest quarterly report from NTT Group security company Solutionary released this…

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment  China’s Alibaba Group Holding Ltd (BABA.N) said on Wednesday it would invest $1 billion into its Aliyun cloud computing arm to challenge Amazon.com Inc’s (AMZN.O) lucrative Web Services division, opening a global front in the battle between the two e-commerce giants. With the global cloud computing market estimated by…

Global Cloud Development An Open Question

Global Cloud Development An Open Question

Global Cloud Development Statistics and projections from Cisco’s Global Cloud Index show that the world’s data centers are already processing 4.7 zettabytes (4.7 million petabytes) per year. Cisco research says this amount will continue to grow by 23% annually for the next few years. (Inforgraphic Source: https://visual.ly/how-much-petabyte) If we project these numbers over the next 25…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising