Category Archives: Security

Malvertising – Hiding In Plain Sight

Malvertising – Hiding In Plain Sight

Security Vulnerabilities In Advertising Bad guys never quit trying to be bad guys. For as long as there have been personal computers, we have had to put up with viruses, malware, spam, and a host of other carefully created annoyances whose danger level ranges from mild to catastrophic. We can now add malvertising to this…

Sony Pictures computer system hacked

Sony Pictures computer system hacked

Sony Pictures Entertainment has been targeted by computer hackers in an attack which reports say has forced the company to shut down its corporate network. Read the source article at BBC – Homepage

Shared Responsibilities for Security in the Cloud, Part 1

Shared Responsibilities for Security in the Cloud, Part 1

When businesses owned their applications and all underlying infrastructure, they also owned their security. Now this is changing with a shift in ownership and operational responsibilities over many applications as they are moving to the Cloud. In the cloud era, security is not owned solely by the cloud service provider (CSP) or consumer. Cloud security…

Cloud Infographic – CloudTrends Report 2014

Cloud Infographic – CloudTrends Report 2014

CloudTrends Report 2014 Report finds that enterprise-managed services for greater visibility, control, QoS and security of cloud applications are on the rise Key findings of the Allot CloudTrends Report include: Over 45% of CSPs are offering public cloud applications and services for enterprises ranging from basic email and storage to fully-fledged unified communications, CRM and…

Don’t Go Breaking my Heart – Wearables and Your Health

Don’t Go Breaking my Heart – Wearables and Your Health

Wearables and Your Health Former Vice President Dick Cheney famously admitted recently that he had the wireless feature of his pacemaker turned off. The ex-VP, who has a history of cardiac trouble, recently underwent a pacemaker upgrade, but is naturally reluctant to leave it exposed to hackers who might find a way of remotely shutting…


CloudTweaks Sponsors - Find out more!

Contributors

Featured Writers

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

From storage to processing – the cloud’s next step?

From storage to processing – the cloud’s next step?

What is the cloud’s next step? When speculating about where the cloud is heading next, we often think about extra security layers and how hybrid models might grow in prevalence. However, collaboration on the cloud is becoming more of a consideration as files grow. Could the cloud’s next big step be from mostly storage to…

Minimizing Downtime During Mergers & Acquisitions

Minimizing Downtime During Mergers & Acquisitions

Minimizing Downtime As economic conditions gradually improve, North American companies are starting to recover their confidence, and are looking beyond mere survival. A recent survey by KPMG focusing on mergers and acquisitions demonstrated cautious optimism, with 21 per cent of companies planning to initiate at least one acquisition this year, and 16 per cent planning for…

4 Things To Know Before Virtualizing Your Desktops

4 Things To Know Before Virtualizing Your Desktops

Forrester Research: The Keys to a Successful Deployment Desktop virtualization projects are transformational. They can dramatically minimize IT costs while better empowering workers with more ubiquitous access to the applications and data they need to be productive. In fact, according to recent research by Forrester, worker productivity when working remotely across multiple devices, increased 51%…

5 Mistakes That Adversely Impact Seamless Cloud Migration

5 Mistakes That Adversely Impact Seamless Cloud Migration

There is absolutely no doubt migrating a section of your IT assets, non-core business processes or the entire spectrum of business systems to the cloud makes immense sense. There are plenty of business benefits linked to cloud computing; most astute businesses are using cloud computing in some capacity or other and if you aren’t doing…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter