Category Archives: Security

Google Wins One Battle, Microsoft Wins Another, But The War Continues

Google Wins One Battle, Microsoft Wins Another, But The War Continues… On an article published more than a year ago on January 7, 2011, I had written “Microsoft and Google have never been the best of friends, and this mutual dislike has extended to their ventures in the cloud computing space as well. Both these…

The 4 Primary Cloud Deployment Models

The 4 Primary Cloud Deployment Models

The 4 Primary Cloud Deployment Models With most organizations focusing on leveraging the cloud in order to cut capital expenditure and control operating costs, there is aggressive growth in business for cloud adoption. However, the cloud can bring security risks and challenges for IT Management, which can be more expensive  for the organization to deal…

Cloud India: The Litmus Test

Cloud India: The Litmus Test Lap up your plate of lamb vindaloo, wrap up your daydream of spartan ashram living, scroll past the Bollywood-lite selections on Netflix (“Slumdog,” “Bend It Like Beckham”), and you will locate a culture whose viewpoint on innovation rivals America’s values of commerce and democracy. In India, every new technology must…

How Can We Secure Mixed-Cloud Environments?

How Can We Secure Mixed-Cloud Environments? There is no doubt as to the benefits that cloud computing brings to businesses around the world. But there is also no question that security is one of the most immediate concerns when moving from local, in-house IT solutions to cloud-based solutions. Businesses tend to mix and match different…

SemYOU: Your Office In The Cloud

SemYOU: Your Office In The Cloud In the increasingly crowded world of SaaS applications for the office, we have a new entrant. The Los Angeles-based semYOU claims to make the experience even better and simpler. “In less than three minutes, a business can make the whole software infrastructure of semYou available for individual users, teams,…

The Gartner Prediction: One Third Of User Data In The Cloud By 2016

The Gartner Prediction: One Third Of User Data In The Cloud By 2016 In a recent research study, Gartner speculated that the prevalent shift towards the cloud, primarily fuelled by the present-day end-user craving to store, share and access data on a multitude of devices, will lead to a jaw-dropping storage of an estimated one…

Cloud Helps Europe's Small Biz Smash The Economy

Cloud Helps Europe’s Small Biz Smash the Economy The tribulation of the European economy has sunk dramatically enough to warrant the front page of even American financial headlines. Yet in the face of such widespread woe has arisen a new population of pliable SMEs, or small- or medium-sized enterprises, throughout the continent. Cloud computing has…

SaaS And Cloud Computing

SaaS And Cloud Computing People often confuse software as a service (SaaS) with cloud computing. That is, they think that SaaS and cloud computing refer to the same thing and are, therefore, interchangeable. Before we can really differentiate the two, we must first define each. Cloud computing is a form of computing paradigm which uses…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter