Category Archives: Security

Microsoft’s Biggest Client, Or Just A PR Stunt? – Part I

Microsoft’s Biggest Client, or Just a PR Stunt? – Part I On April 13, Reuters ran a news item where “Microsoft announced its biggest-ever customer for cloud computing – software that it hosts on behalf of clients and delivers over the Internet – after winning a contract to provide free services to the All India…

Are You Overwhelmed By The Number Of Cloud Services To Manage?

Are You Overwhelmed By The Number Of Cloud Services To Manage?

Are You Overwhelmed By The Number Of Cloud Services To Manage? The past 2 years have seen a rapid adoption of cloud services among enterprises. CIOs and CTOs were able to convince the CEOs about the business case for cloud migration. However, the biggest sticking point is in the integration of various cloud services. The…

The Carbon Footprints Of Cloud Computing

The Carbon Footprints of Cloud Computing IT is a tool to reach environmental sustainability objectives which allow business entities to report, manage, analyze, and measure environmental data in order to manage risks and lessen their general impact. The kind of IT services and infrastructure chosen is part of the business entity’s carbon footprint which can…

Premise To Cloud: Unified Communications – Converge, Collaborate, Compete

Premise to Cloud: Adopting Hosted Unified Communications to Converge, Collaborate, and Compete Collaboration is the linchpin to being competitively relevant. And being relevant is not solely defined by the products or services that an enterprise now offers. Relevancy is defined by how quickly and effectively an enterprise responds to market needs, incubates new ideas, and…

Cloud Management And The New Paradigm Of Computing

Cloud Management And The New Paradigm Of Computing Cloud computing has definitely revolutionised the IT industry and transformed the way in which IT Services are delivered. But finding the best way for an organization to perform common management tasks using remote services on the Internet is not that easy. Cloud management incorporates the task of…

Healthcare In The Cloud: Good And Bad And Around The World

Healthcare in the Cloud: Good and Bad and Around the World What field isn’t the cloud revolutionizing right now? From music to entrepreneurship, virtually every relevant sector is capitalizing on some aspect of the cloud in order to improve efficiency and — one hopes as a byproduct — creativity as well. Healthcare is not immune…

Cloud Research Findings: Hackers Feast On A Hefty $1 Billion In Brazil

Cloud Research Findings: Hackers Feast On A Hefty $1 Billion Fairly recently, analytics giant Price Water House Cooper (PwC) had made its research outcome public. The report throws light on the trembling discovery that hackers have cumulatively laid their dirty hands upon an amount as large as US $1 billion rightly belonging to enterprises stationed…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter