Category Archives: Security

Cloud Infographic: Google Drive Vs The Competition

Cloud Infographic: Google Drive Vs The Competition There are hundreds of cloud services available today, a fact which does not make it any easier for users to select a cloud storage provider that fits their needs. Google is no longer the only kid on the cloud computing block. In fact, Apple, Microsoft, Amazon and even private…

Q&A With Chris Hale: Cloud Master Data Management

Q&A With Chris Hale: Cloud Master Data Management

Q&A with Chris Hale We caught up with Chris Hale, VP of Global Product Marketing for Liaison Technologies, to get his take on why the cloud is making the adoption of master data management (MDM) more feasible for mid-market companies, as well as opening new opportunities for global enterprises. Historically, only large enterprises have adopted…

Mobile Cloud Computing: The Next Logical Evolution

Mobile Cloud Computing: The Next Logical Evolution Mobile Cloud Computing (MCC) is the next logical evolution for cloud computing. Though mobile technology is still evolving, especially the operating systems, it is doing so in a very rapid pace. Most modern mobile devices are now sporting capable web browsers mainly due to advances in mobile operating…

Outsourcing Services – Risks And Advantages

Outsourcing Services – Risks And Advantages Outsourcing non-core activities represents an essential preoccupation of every modern IT company. But, as IT companies consider the vast positive aspects and allure of IT services outsourcing, they must balance the risks and issues with the potential for labor arbitrage (the economic phenomenon where jobs move to countries where labor and the…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter