Category Archives: IT

Whitepaper: Deploy and Maintain Thousands of Security Devices in Seconds

Deploy and Maintain Thousands of Security Devices in Seconds Organizations that used to be relatively safe from advanced and organized cyber crime are entering a new era. Their IT and network risk levels are rising as hacking becomes a more mainstream form of crime. This industrialization of hacking has made any organization offering a reasonable amount of financial,…

Cloud Infographic: The Rise Of Cloud Hosting

Cloud Infographic: The Rise Of Cloud Hosting

Cloud Infographic: The Rise Of Cloud Hosting In years past, companies looking to host a high-traffic website have had one of three main options: Shared Web hosting services Dedicated Web hosting services Hosting on local IT infrastructure Shared Web hosting services have been most popular with small businesses, but they suffer from performance bottlenecks, limited…

Social Cloud: The Explosion Of The Social Cloud

Social Cloud: Forrester Names Yammer As A Leader Activities Streams Base An Integrated Social Layer The enterprise social software market is exploding thanks to converging trends of consumerization, cloud, and mobile. In this must-read report, “The Forrester Wave: Activities Streams, Q2 2012“, Forrester Research Inc. evaluated five social software vendors with core strengths in the…

BYOD Is In – Bring Your Own Cloud, Not So Much

BYOD Is In—Bring Your Own Cloud, Not So Much As employees continue to bring personal mobile devices and laptops into the workplace, most businesses have resigned themselves to dealing with the security and management headaches of the new BYOD reality. But now, with the growing popularity of cloud storage and synchronization services, companies have found…

Can The Cloud Help A Marketing Professional?

Can The Cloud Help A Marketing Professional?

Can the Cloud Help a Marketing Professional? “Absolutely!” is the answer to this article’s titular question. Cloud computing’s natural talent in rendering everyday essential business maneuvers automatic, more flexible, and more timely makes it a downright essential for successful modern-day marketing campaigns. Here are a few reasons why. Selection of services is one of the…

Should Cloud Computing Service Providers Screen Potential Customers?

Should Cloud Computing Service Providers Screen Potential Customers? The World Wide Web is full of articles advising consumers on what they should look for when choosing a cloud provider, how they should negotiate contracts with providers, what danger signs they should be aware of and a plethora of other advice. However, an extremely illuminating article…

Data Security In The Cloud: Solutions For Consumers And SMBs

Data Security in the Cloud: Solutions for Consumers and SMBs A recent small business cloud computing survey from Microsoft found that a chief concern of potential SMB cloud customers is the security and privacy of their data. A full 70% of small businesses are concerned about where their data is stored. Just over half of…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter