Category Archives: Security

The Need For A Security Incident Response Team

The Need For A Security Incident Response Team

Security Incident Response Team The incidences of modern cyber-attacks are growing, along with their sophistication. Every single weakness, whether technological or human, is being constantly exploited, and the interconnectedness of computers means that a break-in, theft or infection on one system has far-reaching consequences with customers, suppliers and the general public. Network Security Network security…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Overcoming Compliance Challenges and Regulatory Risk In The Cloud

Overcoming Compliance Challenges and Regulatory Risk In The Cloud

Mitigating Regulatory Risk In The Cloud Some of the great business opportunities for Unified Communications as a Service (UCaaS) integrators and Value-Added Resellers (VARs) have been the emergence of cloud, telephony and Unified Communications (UC) technologies such as VoIP and virtual data center compute / storage. Others include the adoption of cloud operating systems such…

5 Things A Cloud Provider Should Offer – Part II

5 Things A Cloud Provider Should Offer – Part II

5 Things A Cloud Provider Should Offer Part II I recently posted an article for the CloudTweaks community on “Cloud-Enabled Managed Hosting: 5 Things a Cloud Provider Should Offer” and many readers have since asked me to expand upon this list. So, as a sequel to my first article, here are another five things I…

Tennessee Lawyers Ethics Board Grapples With Cloud Storage

Tennessee Lawyers Ethics Board Grapples With Cloud Storage

Board Grapples With Cloud Storage One of the major concerns with cloud technology is security. Some companies and analysts worry that leaving sensitive data on the cloud will open organizations to a myriad of risks. While certainly precautions must be taken, it’s questionable whether storying information on the cloud is any more dangerous than storing…

Cloud Pinup: Security Scorecard – Highly Automated, Extremely Effective

Cloud Pinup: Security Scorecard – Highly Automated, Extremely Effective

Security Scorecard Security Scorecard offers a fresh approach to online security. Instead of just worrying about a single company’s assets, Security Scorecard’s monitoring services can keep watch over entire ecosystems, monitoring partners and even competitors to watch for vulnerabilities. The monitoring service can also help your company compare its performance with industry standards. Security Scorecard…

IBM Helps Make “Bring Your Own” Cloud Apps Safe For Work

IBM Helps Make “Bring Your Own” Cloud Apps Safe For Work

Cloud Apps Safe For Work One-third of Fortune 1000 Employees Share Sensitive Company Data with Third-Party Apps; IBM Cloud Security Enforcer Helps Organizations to See, Manage and Secure Usage Across Public and Hybrid Cloud Environments ARMONK, New York – September 18, 2015 – IBM today announced new cloud security technology that helps safeguard the increasing use…

Beware The Random Element In Big Data

Beware The Random Element In Big Data

Big Data Analytics In 1983, author Isaac Asimov published a remarkable science fiction anthology called Foundation. Its central theme was the use of mathematical models to envision the progress of civilization and to establish appropriate benchmarks for its successful continuance over thousands of years. In essence, the book focused on big data as the driving…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising