Category Archives: SaaS

Usermind – Orchestration Hub for Business Operations

Usermind – Orchestration Hub for Business Operations

Orchestration Hub for Business Operations

Usermind, the first business operations (BizOps) technology platform that lets companies coordinate end-to-end processes as well as full customer, product, and partner lifestyles across all of their enterprise apps, has just announced $14.5 million in Series B funding, led by Menlo Ventures, with participation from Andreessen Horowitz and CRV. Though ops are traditionally confined to their individual departments, BizOps gets the most out of business logic and data through company-wide software orchestration from sources such as Marketo, MixPanel, and Salesforce with the ultimate result of better retention and improved revenue results than seen in more traditional siloed methods. Corresponding with CloudTweaks, Usermind’s CEO and co-founder Michel Feaster explains, “Right now, many companies aren’t aware of BizOps or that commercial technology exists, but this reality is going to change quickly. Look no further than LinkedIn, Uber or Stripe to understand the potential of BizOps. Every company wants that kind of growth and agility. Consequently, I believe BizOps has the potential to become a $30-50 billion market.”

michel-feasterFeaster, the Harvard dropout who previously led HP’s $1.6 billion acquisition of Opsware, Ben Horowitz’ service automation company. With a career spanning nearly 20 years in various enterprise software roles, Feaster is responsible for company vision, strategic direction, planning, and execution, and her earlier success as VP of products for Apptio where she defined the category and discipline of Technology Business Management, drove product strategy, and helped grow the company from 30 to almost 400 employees, bodes well for Usermind’s future.


The emerging business practice of BizOps is designed to drive front-office growth and revenue, similarly to DevOps’ transformation of IT and engineering. Usermind points to three core principles: breaking down the walls between business operation teams; shifting the perspective from tactical management of leads, opportunities, and escalations to a focus on strategic management of customer, partner, and product lifestyles; and combining analysis with action and experimentation for improved growth, decreased cost of sales, and increased lifetime value of customers. Feaster states, “This emerging practice (BizOps) combines teams, strategy and orchestration technology to unify siloed SaaS platforms and other systems of record to create a gestalt. With BizOps, companies can change their perspective from leads, opportunities and escalations to a more strategic focus on customer, partner and product lifecycles.”

Continues Feaster, “The number of SaaS applications such as Salesforce, Workday and Zuora have grown dramatically as companies race to digitize their businesses across all departments. The next step is creating end-to-end processes such as improving collections, reducing churn or providing a seamless customer experience. This is done through BizOps.” Specifically built for marketing, sales, and business operations teams, Usermind professes to be the first unified platform for orchestrating business operations, automating end-to-end processes and unify data across applications and teams without any coding requirements.

By Jennifer Klostermann

Tweaking Your SaaS Marketing To Instill Startup Growth

Tweaking Your SaaS Marketing To Instill Startup Growth

SaaS Marketing Growth

Primarily evidenced by the explosive growth several startups have managed, growth hacking is a successful development tool that’s achieved some acclaim in the last few years. One reason that startups specifically have been making use of growth hacking is the smaller budgets they contend with compelling a ‘ship and revise’ strategy. These startups will often send out their initial products early on, encourage early adopters to provide rigorous feedback, and then refine their products. Large, established organizations tend, instead, to consume hefty budgets for traditional marketing and launches, but this often means customers aren’t getting the functionality they want. And so, taking a leaf out of the startup book of marketing, most organizations could benefit from growth hacking and its accompanying devices.

Boiling Down Growth Hacking

Growth hacks are shortcuts or loopholes to growth, usually extremely high growth, of new products. They are low cost, often free, and rely on word of mouth. The best growth hacks take full advantage of digital and social media and go viral through satisfied users spreading the word. Data analysis, user feedback, and growth objectives are key to growth hacking, and just as effective implementation can mean tremendous success, so poor execution could end in disaster. Netflix, Twitter, Dropbox, Uber, Airbnb, Slack – all Cloud based SaaS examples of brands that have successfully hacked their growth. The list of failures is harder to dig up, but undoubtedly much longer.  

Below is an infographic discovered via pierrelechelle covering Slack’s growth which has now reached over 1 million active users with no end in site.


When Growth Hacking Doesn’t Work

Considering its ideals of creativity and ingenuity, growth hacking can be a risky device. Though they often seem like cheap and easy solutions, many growth hacks fizzle out long before they provide the necessary boost to the business. Three core hazards stand out:

  • They’re only there for the freebies

Getting the customers to your site is, of course, an essential goal, but if they’re just window shopping, your hacks aren’t successful. Without enough paying customers, no amount of positive word of mouth will do you any good, so be sure to turn visitors into committed subscribers. Website design is one quick-fix strategy for improving conversion rates, keeping navigation neat and intuitive, and including accessible copy. Make sure you’ve included one strong call to action that allows customers to spread the word via social media and ensure your sign-up is quick and easy.

  • Stats just aren’t your thing

If you’re not correctly measuring campaign results and then using that information to refine your efforts you’re wasting time and money. Fruitful growth hackers embrace a trial and error mindset that views failures as that paving stones to success and avidly experiment with their hacks. Track data, measure results, and answer questions; set a measurable goal and track your progress. A successful campaign provides data for scaling up the next campaign; a ‘failed’ campaign shows you how to adapt your next one.

  • A lead balloon

Creating hype is essential, but no amount of growth hacking hype can make a bad product look good. Quite the opposite. Growth hacking relies on positive consumer feedback, and if you’re delivering a product or service that disappoints, prospective users will vanish. Some suggest a 95% product investment, 5% marketing investment, ensuring your product is the best it can be, and organizations need to honestly and realistically evaluate product strengths and weaknesses so that they’re ready to work on the feedback they get. Growth hacking is valued by marketers and consumers alike because it is based on candid product communication and a loyal user base.

By Jennifer Klostermann

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors

A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world.

Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly on this comparatively still nascent industry.


A recently discovered CB Insight report via Twitter stated that the funding of  IoT startups has more than doubled over the last five years. Amongst the most active IoT startup investors since 2010 were Intel Capital at number one, followed by Qualcomm Ventures at the second spot.

Interestingly, the venture arms of both the tech giants have been particularly focused on sensor companies and wearable startups. Industry observers are of the view that because their core business model is heavily reliant on the design and manufacture of ever-smaller chips that power, both Intel and Qualcomm are more inclined to see IoT startups as strategic assets.

In 2015, Intel Capital led a particularly successful round to BodyLabs, a startup that deals in 3D body-scanning sensors. Apart from that, the company invested in Sano Intelligence, another fast-growing developer of biometric sensors.

Other IoT infrastructure startups that bagged rather lucrative investments from Intel Capital include Bocom Intelligent Network Technologies, SigFox, and Stratoscale.

Similarly, Qualcomm Ventures have also been showing great interest in emerging brands such as drone manufacturer 3D Robotics and Whistle Labs, a dog wearable manufacturer. In addition, the company also have invested in sensor networks made by Placemeter, Panoramic Power and Streetline.

Foundry Group and KPCB made it to the third rank in the list of top IoT investors. While Foundry Group seemed particularly focused on hardware manufacturers such as Fitbit, MakerBot and LittleBits, KPCB has been investing across a diverse range of IoT niches including auto, home automation, as well as wearables.

By Brent Anderson

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing Through Accessibility & Aesthetics

Optimizing Digital Marketing In The Cloud

Marketers are constantly looking for better ways to tantalize and engage customers, and there’s no space more competitive than the digital universe. Deliberating over pleasing layouts, effective calls to action, site responsiveness, and much more, digital marketers have more than enough to keep themselves busy without understanding the intricacies of website design and optimization. The corporate giants have access to department upon department of developers and designers, digital strategists, research teams, and publicity divisions backing up marketers, but the rest of the business world, made up of small and medium-sized enterprises, have no such luxuries. Luckily, a few shrewd service providers are ensuring their clients, no matter their size, have all of the necessary tools to compete successfully in the cloud.


(Image Source: Shutterstock)

Ease of Use

According to Econulstancy, 40% of people will abandon a web page if it takes more than three seconds to load, and so with trillions of dollars of retail sales ‘web-influenced’, ensuring your site is both accessible and optimized is a fundamental business requirement. Says Tim Schulz, chief product officer at Bigcommerce, “The key to success in today’s hyper-competitive retail market is to sell not only a product, but an entire experience to the shopper.” Organizations can no longer rely merely on providing a good product or service but instead must afford their customers an experience that is enjoyable, user-friendly, and ultimately superior to their rivals.

Aesthetically Pleasing

ben-mooreLooks do matter, and people are constantly judging books by their covers. Prudent companies spend no time concerned with this injustice, but rather take advantage of it. With many consumers basing decisions on where to spend their money purely on which website they believe the most attractive, businesses must constantly revamp and revise their site design, always preserving a fresh façade that discreetly expresses the company brand while charming the customer. “There is nothing more important than connecting your brand with shoppers,” states Ben Moore, CEO at Pixel Union.

Tools for Streamlined Experiences and Enjoyable Designs

A leading ecommerce platform, Bigcommerce, is magnifying their clients’ success with new attractive and responsive themes optimized for various catalog sizes, merchandise categories, and promotions. Collaborating with Pixel Union, these new themes promise a seamless shopping experience across all devices, and will continue to evolve to include advanced features traditionally only available through fully-customized storefronts. Says Schulz, “With our new themes, and the new development framework that powers them, our merchants will make an incredible first impression on today’s sophisticated online shoppers and ultimately sell more than they would on any other ecommerce platform in the world.

Through their new themes, Bigcommerce is providing clients with progressive features, including:

  • Optimized designs for mobile shoppers;
  • Seamless and simple customizations;
  • Built-in faceted search functionality;
  • Optimized one-page checkout.

Bigcommerce is putting a major focus on the end-to-end customer journey with these new themes, and that’s going to help merchants communicate their brand better and do more with their storefront to drive sales and build lasting relationships with their customers,” says Schulz.


In addition to a range of premium themes now available on the Theme Marketplace, several styles of free themes are also accessible.

Article sponsored by Bigcommerce

By Jennifer Klostermann

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions

Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that 64 percent of medium and large businesses believe cloud infrastructure is more secure than legacy systems.

What factors contribute to positive and negative impressions of cloud security? What should businesses do to protect their data better?

Fear of the Cloud Arises From Media and Lack of Knowledge


You cannot blame people for being worried about cloud security. Everyone remembers the Target and Home Depot breaches, which compromised tens of millions of customer credit card information, as well as the Apple iCloud hack that leaked private celebrity photos to the public. These incidents caused many major news outlets to question cloud security. However, the media forgot to mention that these three high-profile attacks did not have much to do with cloud computing.

Target allowed a third-party to access its network, and then hackers got ahold of that third party’s log in credentials. Home Depot was attacked in much the same way, with hackers stealing a vendor’s login, accessing the network, and then using custom malware to get around the company’s antivirus software.

Even large businesses have mixed feelings about security in the cloud, naming it both the number one benefit and most frequently encountered challenge.

Many recent data breaches have been reported incorrectly. … In most cases, it is human error, and the Cloud cannot protect you from that.” – Jason Reichl, CEO, Go Nimbly

Impressions of Cloud Security Remain Resilient

Despite these events, this year, 90 percent of enterprises plan to increase or maintain their annual spending on cloud computing. If cloud infrastructure were such a risk, businesses would not be investing in the platform at such high rates.

david-linthicumDavid Linthicum, Senior Vice President of Cloud Technology Partners, says to think about cloud security systems like this: is your money safer stuffed in a mattress at home where you have control of it or with your local bank? A bank, obviously, is better positioned to protect your money because they have a vault and security cameras and are insured. Likewise, a cloud service provider (CSP) is better positioned to protect your data because they invest in 24-7 monitoring, the best cyber security tools, and physical barriers, such as video surveillance and biometric scanning.

Unfortunately, cloud infrastructure security on its own, out-of-the-box, is not enough to safeguard your business’ crucial data.

Steps to Ensure Data Security in the Cloud

What steps should businesses take to ensure data security, when using cloud infrastructure?

Migrating to the cloud starts with selecting a CSP that fits your business’ needs. It is important to recognize that not all CSPs are equal.

In 2013, former Editor in Chief of Yahoo Tech Dan Tynan detailed his experience with Box. In particular, he talked about how all his Box files once disappeared for six months. Specifically, his login didn’t work and the company could not locate the account associated with his email. This means Tynan’s data was missing for half a year, which raises concerns about stolen information. Who had access to his data?

National Security Agency (NSA) whistleblower Edward Snowden also warned against relying on the security features of another popular cloud service, Dropbox.


Dropbox? Get rid of Dropbox. It doesn’t support encryption. It doesn’t protect your private files. Use competitors, like SpiderOak, that do the same exact service, but they protect the content of what you’re sharing,” Snowden said in a 2014 interview with the New Yorker.

Indeed, it is true: some CSPs are more secure than others. For example, the difference between Dropbox and SpiderOak is that Dropbox, as well as many other major CSPs, encrypts data on its own servers but does not encrypt data locally, leaving it vulnerable to attacks. Conversely, SpiderOak encrypts data on both your local servers and their personal servers, reducing the opportunity for a security breach.

Regardless of the CSP your business uses, additional local security measures, such as data encryption, improved identity access policies, and regular audits, will minimize the possibility of a costly cyber attack.

By Sarah Patrick

Cloud Tools For Managing Your Virtual Office

Cloud Tools For Managing Your Virtual Office

Virtual Office Cloud Tools

Today, those with the necessary skill sets and employment experience are scattered across the globe, and virtual offices allow you to employ the right person for the right job, even if your head office is far from a particular talent pool. But managing remote offices and personnel requires a certain finesse not necessarily needed in a physical office. Thankfully, the cloud provides the structure and tools necessary to ensure fast communication and collaboration, reliable project management, and secure storage and operations.

Collaboration & Communication


(Image Source: Shutterstock)

Efficient business environments require regular, often real-time, communication, and various cloud-based software and app solutions make this possible. Organizations are able to go so far as archiving employee discussions for later reference via ‘chat rooms’ that make inter-office communication easy, and these solutions typically include mobile apps which let employees stay in touch wherever they are. A few solutions such as Convo, Flowdock, Slack, and Yammer provide basic versions at no cost, as well as a range of upgrades for purchase once you’re sold on their functionality.

Once the underlying communication system is in place collaboration is a lot simpler, but there’s a separate range of cloud tools designed specifically to enhance the cooperation of various virtual teammates. Allowing your workforce to collaborate on documents, presentations, code, and whatever else they might be teaming up on, cloud collaboration tools help prevent overlap while ensuring the job gets done. Hackpad and Evernote provide many document collaboration tools; Github stands as a fast and secure code receptacle and version control system; and XMind and MindMeister are some of the big players used for brainstorming ideas.

Project Management

Depending on your preferred development method, a comprehensive collection of cloud-based project management tools are available, but a few of the major providers are Asana, Basecamp, Jira, and Trello. These tools allow the delegation of tasks and progress monitoring, and the primary interface typically acts as the command hub with projects listed and linked to associated tasks. Project managers can create teams, assign tasks, and set deadlines, and those involved in each project are then able to update their own progress and track that of other project members.

Storage & Security

Cloud Comic

It’s important to understand the difference between cloud storage and cloud backup, but ultimately, they’re both necessary tools. Storing files on the cloud provides access across remote offices, and both SpiderOak and TeamDrive offer encrypted cloud storage solutions – along with many, many others. Using a storage service that offers synchronization is a must, as these solutions ensure the most up-to-date versions of files are available to all connected devices. Backing up workstations is a separate, essential function allowing the storage of the contents of multiple devices in one account. IBackup, Carbonite, and Mozy are a few of the enterprise solutions with easy management for multiple devices, fast upload speeds, and a host of useful add-ons.

Finally, just as in physical offices, security is a necessary element that needs to be considered. Along with the obvious anti-virus software requirements and reliable and responsible service provider testing, password control needs to be implemented. LastPass, Dashlane, and KeyPass are password managers with business and team capabilities that help employees follow correct password protocol and keep your remote offices protected.

By Jennifer Klostermann

Jargon Free: The Three Real Main Benefits of Cloud IAM Solutions

Jargon Free: The Three Real Main Benefits of Cloud IAM Solutions

Main Benefits of Cloud IAM Solutions

There are significant discussions concerning cloud applications and software solutions, such as identity and access management (IAM) solutions, which are used in conjunction with them. These articles often discuss complex technical reasons and benefits, which may be difficult for a non-technical person to understand.

Cloud applications and cloud IAM solutions go hand in hand. This is because many of the benefits of cloud applications cannot be realized without a management solution in place. Without all of the technical concepts, what are these benefits, though? Perhaps the following points can help. These are three straight forward, easy-to-understand reasons why cloud identity management solutions are beneficial when implemented with cloud applications.

Popular SaaS Applications

Elimination of Manual Account Management Tasks

Manual account management for any type of application is time consuming. Admins must manually enter and create accounts in each application for a new user, which can also lead to errors. For cloud applications, providers often try to mitigate this issue by offering a web-browser where managers can control access to the cloud application directly. However, they rarely automatically provision processes and this necessitates a sequence of manual operations.

One of the most important benefits of cloud IAM solutions is that they work seamlessly with both in-house and cloud applications, so that admins can manage both from one dashboard. This allows an HR employee or manager who is creating accounts for a new employee to easily check off which accounts need to be created in any applications, and the accounts will automatically be provisioned in near real time. This allows for accounts to be created quickly and easily, so that end users don’t need to wait around for the access that they need.

Increased Security

When an organization begins to use several different cloud applications it becomes difficult to ensure that the correct people have the proper access to them. Users may have access to systems and applications that they shouldn’t, leaving the company’s data unsecure. Often over time, employees are granted access for a project, when another employee is on vacation, etc., and that access is never revoked. Additionally, it needs to be guaranteed that cloud application access is disabled once an employee leaves the organization. This step is often overlooked since a manager needs to manually disable the employee account in each application that they must access.

Holiday Photos

IAM solutions allow for many different resolutions. A manager can first easily generate a report that shows exactly who has access to what, as well as any changes that they are making in that system. Many solutions also support workflow management. With workflow management and self-service, employees and managers themselves can request, check and approve facilities without any IT intervention. For example, an employee may request access to an application, a project or to view reports. The approval process is part of a structured workflow. The manager can authorize the request and it can be implemented immediately in the network, or they deny the request and the employee will not receive access. This not only dramatically improves efficiency, but this access also assists with managing an organization’s security. When an employee requests additional access or a new account, these established access rights ensure that only the correct people are providing the permission.

This process also allows a manager to easily disable the accounts of an employee who has left the organization, which ensures security of the network and data. They simply disable the user account in the solution and all connected accounts are automatically disabled.

Ease of use for remote employees

Another main issue is that cloud applications have great benefits for remote employees. These employees may access their work from anywhere at any time that they need to get their work completed. Without the correct cloud solutions in place, though, these main benefit may have some issues. For example, think of an employee who is working late at night, or is on the go and forgets one of their many, complex passwords. They aren’t able to contact the helpdesk to reset their password, which hinders them from getting quick access.


Password solutions such as single sign-on and self-service password reset, seamlessly work with in-house and cloud applications so that the organization can provide these solutions to all employees. Cloud SSO allows users to have a single set of credentials for all of their applications, so that they don’t need to enter numerous sets of credentials. This is extremely convenient for an employee who works on the go and needs to quickly log into their portal and access all of their applications. Self-service password reset solutions allow the employee the opportunity to reset their own password after correctly answering several security questions, without needing to contact the helpdesk. Remote employees, or employees who work after hours, benefit greatly from this since they are able to address any issues themselves even after the helpdesk’s regular business hours.

These are the three greatest benefits of cloud IAM solutions, without any technical jargon. Anyone, whether technical or not, can easily see that these solutions compliment cloud applications and allow their benefits to be seen without any major issues.

By Dean Wiech

The Road To Cloud Billing As A Service

The Road To Cloud Billing As A Service

The Road To Cloud Billing

With cloud services becoming more widespread and complex, cost management and billing require greater consideration and better facilitation, and just as one-size-fits-all cloud solutions are no longer practical, so too must pricing structures evolve and be tailored to individual clients. The global cloud billing services market features an array of vendors, and competition is fierce between the top players seeking to gain pole position while smaller vendors emerge with their own innovations and allures. Making sure the service you choose ticks the right boxes can mean the benefits of time saving, cost reduction, and superior client service, to name but a few.

Cloud Billing as a Service

Though CFOs have traditionally preferred capital expenditure over operating expenses thanks to the advantages of amortization and depreciation of investments over time, the tendency to shift IT investment from CapEx to OpEx is growing as the rapid advancement of technology makes IT infrastructure needs less and less predictable. Just as cloud computing promises flexible IT solutions that allow businesses to react quickly to changing circumstances, so cloud billing links the essential components of Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) to provide the tools to monetize cloud offerings, along with the necessary agility to adapt and develop with the ever-changing landscape.


(Image Source: Shutterstock)

Managing cloud consumption within a company or service provider requires a culture shift, and cloud billing helps make this move by providing organizations with the correct set of tools to manage functional accounting requirements such as quotations, invoices and statements, payment schemes, and user identification via the cloud, combined with the non-functional but as essential security and scalability requirements so advantageous in a cloud environment. The change in relevant management processes further allows organizations to leverage robust cloud billing solutions, providing usage-based and recurring revenue models through user-friendly and flexible platforms. And cloud billing solutions help ensure accurate usage metering, allow defined multi-service and multi-level costing, enable maximized revenue through accurate billing, and offer customers value thanks to relevant promotion and discount functions.

Optimizing AWS Cloud Resource Management

Amazon Web Services (AWS) is a leading secure cloud platform with an annual revenue of around $10 billion and approximately 2,500 certified partners. It delivers database storage, compute power, content delivery, and further functionality to help organizations scale and grow. Along with the broad range of core cloud infrastructure services provided, AWS promises to accelerate cloud success through their rich platform services such as analytics, mobile services, enterprise applications, and Internet of Things (IoT) while improving operational efficiency and developer productivity through management and developer tools.


However, any offering with such a range and depth of features is consequently intricate, and many users find it difficult to navigate. Herein lies a sub-industry of organizations able to optimize cloud platforms such as AWS and ensure better utilization. CloudMGR is one such organization reducing AWS bills considerably while ensuring the day-to-day management of cloud resources is easier, faster, and more automated.

Optimizing AWS Billing and Cost Management

Providing solutions for both next-gen MSPs with their cloud-first approaches and successful integration of SaaS and DevOps key to their managed service business models, as well as Managed Service Providers (MSP), CloudMGR has launched new services including AWS Billing and AWS Cost Management to provide existing partners with the ability to offer new recurring models and new providers quicker entry into the market. The AWS Billing service lets partners manage their cloud billing relationship with the customer, further augmenting CloudMGR services which simplify AWS cloud management and assist AWS cost optimization. Additionally, the AWS Cost Management service caters to customers billed directly by AWS, providing the opportunity for cost consulting. These solutions can be employed with either AWS direct billing or AWS distribution partners billing services, further assisting companies to capitalize on cloud computing by making AWS easier to use.

By Jennifer Klostermann

CloudTweaks Comics
A New CCTV Nightmare: Botnets And DDoS attacks

A New CCTV Nightmare: Botnets And DDoS attacks

Botnets and DDoS Attacks There’s just so much that seems as though it could go wrong with closed-circuit television cameras, a.k.a. video surveillance. With an ever-increasing number of digital eyes on the average person at all times, people can hardly be blamed for feeling like they’re one misfortune away from joining the ranks of Don’t…

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

Reuters News: Powerfull DDoS Knocks Out Several Large Scale Websites

DDoS Knocks Out Several Websites Cyber attacks targeting the internet infrastructure provider Dyn disrupted service on major sites such as Twitter and Spotify on Friday, mainly affecting users on the U.S. East Coast. It was not immediately clear who was responsible. Officials told Reuters that the U.S. Department of Homeland Security and the Federal Bureau…

Update: Timeline of the Massive DDoS DYN Attacks

Update: Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…


Sponsored Partners