Category Archives: Computing

New Year, New Cloud? Managing “Extreme Data”

New Year, New Cloud? Managing “Extreme Data” Companies are familiar with the concept of “big data”; every piece of information they generate from day-to-day business processes or when interacting with customers is considered valuable, so long as these pieces are quickly analyzed and converted into actionable results. But according to predictions from the Institute of…

Keeping Your Business Data Secure In An Insecure World

Keeping Your Business Data Secure In An Insecure World If you’re a small or medium-sized business (SMB), you might be hoping keeping your head down and staying off the Cloud will keep your data safe from interlopers — hackers and government agencies alike. Yet Verizon Communications’ 2013 Data Breach Investigations Report found 72 percent of…

20 Million Credit Cards Compromised In South Korea

20 Million Credit Cards Compromised In South Korea According to BBC, 20 million South Korean credit card details have been stolen in one of the biggest security robberies the country has faced, affecting almost half of the population. A contractor for the Korea Credit Bureau managed to gain access and copy 20 million unencrypted names, social security numbers…

The Advantages Of The Private Cloud For Your Business

The Advantages Of The Private Cloud For Your Business

The Advantages Of The Private Cloud For Your Business Reduction in email volume Early adopters of cloud-based collaborative apps are learning quickly how much easier it is for team members to post comments in a FaceBook-style conversation thread, instead of sending and receiving hundreds of cc’d emails. Collaborative environments are opening up opportunities to communicate…

Cloud Infographic: Crowd Funding 2014

Cloud Infographic: Crowd Funding 2014

Cloud Infographic: Crowd Funding 2014 Crowd Funding will be an important factor for many new cloud based startups vying for attention in 2014.  This industry has grown over 1000% during the past 5 years and will continue to do so for several years to come. If looking for alternative methods to pitch your idea to an…

3 Recommended Whitepapers: Cloud Computing For Startups

3 Recommended Whitepapers: Cloud Computing For Startups

3 Recommended Whitepapers: Cloud Computing For Startups Wondering what all of the hype is around cloud computing? Cloud computing has been a popular topic lately, including the discussion of various cloud computing solutions such as Amazon AWS, Google App Engine, and Salesforce.com. Many of the discussions revolve around the enterprise world, but few are talking…

Cloud Infographic: Biggest Security Breaches Of 2013

Cloud Infographic: Biggest Security Breaches Of 2013

Cloud Infographic: Biggest Security Breaches Of 2013 There has been much discussion on security breaches over the last several months. This will continue to be the hot topic in 2014 as companies look for ways to thwart the increase in cybercrime. Provided is an infographic by Marble Security outlining the biggest security breaches of 2013.…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter