Category Archives: Security

Microsoft Powers Up With Purchase Of Xamarin

Microsoft Powers Up With Purchase Of Xamarin

Microsoft’s Recent Acquisition  To many tech commentators, the emerging cloud economy looked like it would be dominated by two familiar giants: Google and Amazon. Google recently announced that Spotify would be using its cloud architecture for its backend, while AWS continues to expand and draw players large and small into its vast orbit like a…

2016 Connected Enterprises Report

2016 Connected Enterprises Report

Connected Enterprises Report Dimension Data’s 2016 Connected Enterprise Report is out, discussing collaboration trends, insights, and strategies in the digital age. With the promise of lower costs coupled with greater productivity, increased agility and better customer engagement, collaboration technologies are providing tools for real-time communication, file sharing, project management, and social networking which benefit product…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

New Levels of Mass-surveillance? There’s a dark cloud hanging over the cloud. Recently, US security chief James Clapper blithely revealed that the government “could” use the Internet of Things for civilian surveillance. Given the heightened alarm caused by domestic terrorism, I take it the word ‘will’ is more applicable than ‘could’ in this case. If…

The Lurking Threat Called Passivity

The Lurking Threat Called Passivity

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around the world using Internet connections to break in and wreak havoc. But surprisingly, a significant…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor