Category Archives: Cloud Computing

Qualys Releases Detection for Bash Shellshock Vulnerability

Qualys Releases Detection for Bash Shellshock Vulnerability

Qualys, Inc. , a pioneer and leading provider of cloud security and compliance solutions, today announced that its Qualys Vulnerability Management cloud service detects the GNU Bash Shellshock vulnerability…. Read the source article at Yahoo UK & Ireland Finance

Factors Influencing The Adoption Of Cloud Computing

Factors Influencing The Adoption Of Cloud Computing

Factors Influencing The Adoption Of Cloud Computing Cloud is typically indicates a large pool of usable resources such as hardware and software that are easily accessible via the Internet. The notable characteristics of cloud computing are on-demand self-service, broad network access, flexibility, resource pooling, rapid elasticity, cost saving, and multitenancy of data (sharing of an application by multiple…

SSL Vulnerabilities in Your Mobile Apps: What Could Possibly Go Wrong?

SSL Vulnerabilities in Your Mobile Apps: What Could Possibly Go Wrong?

By Patriz Regalado, Product Marketing Manager, Venafi The majority of people and consumers don’t usually think about security and data privacy when they log into their mobile banking app, take a photo of the check, and make a mobile deposit directly into their account. Nor do they think about security as they conveniently purchase their…

Recent

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising