Category Archives: Security

Mondo Report: The Top 5 Cloud Positions/Skills In Highest Demand

Mondo Report: The Top 5 Cloud Positions/Skills In Highest Demand

Mondo Reports That CIOs and CTOs Have Top Tech Salaries for 2016: Ranging From $182-$268,000 NEW YORK, NY–(Marketwired – Apr 5, 2016) – Mondo (www.mondo.com) today reported that CIOs/CTOs garnered the top salaries for 2016, ranging from $182-268,000, according to the findings of its annual Tech Salary Guide. Mondo is a leading technology and digital resourcing…

Cloud Solutions For Everyday Problems

Cloud Solutions For Everyday Problems

Moving Into The Cloud In a recent Reddit Ask Me Anything interview, Bill Gates suggested that Quantum Cloud Computing could help solve “some very important science problems”, and though the super-computation we can look forward to has the potential to solve many weighty problems in the future, good old cloud computing as it exists today…

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Lingering Security Concerns Considering the cost and time-to-market advantages of SaaS applications in particular, it’s no surprise that companies are looking to the cloud to meet their business objectives. But what happens when a ‘cloud first’ company must also put security and compliance first? In a recent Bitglass survey report from a cloud access security…

Four FinTech Trends To Look Out For

Four FinTech Trends To Look Out For

FinTech Trends The fintech industry witnessed an enormous growth in 2015. Around $7.6 billion were invested in fintech companies last year, a substantial increase from the $4.7 billion in 2014. There is no doubt that this momentum will continue this year. The growth of capital being invested in fintech companies illustrates how technology and the…

The FBI’s War On Encryption – Now What?

The FBI’s War On Encryption – Now What?

As of last night, Apple’s San Bernardino troubles are officially over. Yesterday, the FBI announced that it no longer needs Apple’s help in breaking into an iPhone linked to last year’s attacks, thanks to a new method for unlocking the phone submitted by an anonymous outside source. For the first time in weeks, Apple’s lawyers can…

CloudLock Unveils Method For Isolating True Security Threats

CloudLock Unveils Method For Isolating True Security Threats

CloudLock New Method Q1-16 Cybersecurity Report: The CloudLock CyberLab’s “Cloud Threat Funnel” Methodology Reveals Distinct User Behavior Patterns, Helping Businesses Lock Into Only the Real Threats WALTHAM, MA–(Marketwired – Mar 28, 2016) – When is a security alert not a real security alert? With hacks and breaches a daily reality for businesses, security teams deal…