Category Archives: Security

Cloud Infographic: Not Everything Is Locked Up Within A Secured Network

Cloud Infographic: Not Everything Is Locked Up Within A Secured Network

“Hackers are breaking the systems for profits. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is a big business.”  Kevin Mitnick It is a common knowledge that the more science and technology develop, the more they become fraught with both good and evil. In our modern times, billions…

Android Smartphone Security And Instagram App Testing

Android Smartphone Security And Instagram App Testing

Android Smartphone Security And Instagram App Testing Our daily lives become more and more dependent on smartphones due to their high processing power and increased capabilities. Smartphones have features of both a mobile phone and a computer, allowing us to talk, text, tweet, email, browse the Internet, make purchases, manage bank accounts, and take pictures.…

Leveraging Cloud Computing Through Automation

Leveraging Cloud Computing Through Automation

If you can define it, you can have it It’s true. The full potential of automation cannot be fully realized until it is informed and supported by an effective IT service management strategy (ITSM) that encompasses your entire IT environment, as well as business objectives, and corporate policy. Technology and business really can function as…

Cloud Infographic: Top Mobile Malware Trends

Cloud Infographic: Top Mobile Malware Trends

Cloud Infographic: Top Mobile Malware Trends “Any sufficiently advanced technology is indistinguishable from magic.” – Arthur C. Clarke In the modern high technology world, we observe mobile malware spreading with such rapid advances. The inforgraphic provided below by NQ.com will help you get the general overview of infection strains and rates with regard to mobile threats.…

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality In part one of our mini two part series, published yesterday, we looked at some of the fallout from the recent celebrity photograph scandal. We looked at Apple’s response, deducing that they correctly believed that users were more responsible than…

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

Cyber Forensics Research Study: Possible 968 Million Android Users Affected A recent study has been released by the Cyber Forensics Research and Education Group (cFREG) at the University of New Haven, which found that there are serious security and privacy problems in the Android platform. 968 million Android users may be at risk due to…

On A Clear Day: Downtime In Cloud Computing

On A Clear Day: Downtime In Cloud Computing

On A Clear Day: Downtime In Cloud Computing As most know, and as the recent Azure outage kindly reminded those who don’t, cloud storage isn’t infallible. Power outages happen all the time. Software is prone to catching nasty bugs. Human error can never be ruled out. Service providers openly acknowledge the possibility of failure. Some, like…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter