Category Archives: Security

How Docker changes cloud security?

How Docker changes cloud security?

Docker and cloud security Nowadays Cloud computing is thriving on its popularity as benefits of cloud adoption are countless, including better efficiency, reduced costs of virtual services, greater accessibility and flexibility. Today almost everything that includes information of individuals and companies is placed on cloud but moving applications to the cloud and acquiring the advantages…

Cloud, CMS and Security

Cloud, CMS and Security

The Growing Interest for Security and CMS CMS services are allowing more people to run their own successful websites without needing to know HTML or any web programming languages. CMS, which stands for content management system, is software you install on your web host/server that allows you to manage the content of your website through…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

McAfee Labs November 2014 Threats Report

McAfee Labs November 2014 Threats Report

Intel® Security today released its McAfee Labs November 2014 Threats Report , including an analysis of threat activity in the third quarter of 2014, and the organization’s annual 2015 Threats Predictions for the coming year. Read the source article at linux.sys.con

Cloud Infographic – The Major Vulnerabilities of 2014

Cloud Infographic – The Major Vulnerabilities of 2014

The Major Vulnerabilities of 2014 There have been 3 major vulnerabilities over the past year. Heartbleed (Dubbed Heartbleed, this dangerous OpenSSL bug allows an attacker to access information from a client or server’s memory.), Shellshock (Once exploited, this vulnerability allows attackers to completely take over the server, enabling them to steal files, delete information, download malware and…

E-Cigarettes Can Hurt Your Computer

E-Cigarettes Can Hurt Your Computer

E-Cigarettes Yet more evidence that smoking is bad for you: A brand of e-cigarettes manufactured in China, has been found to carry malicious software that can be implanted into a computer when plugged into a USB port for recharging. E-cigarettes are in actual fact, electronic vaporizers that heat a liquid solution into an aerosol mist that offers the…

Cloud Infographic – Cyber Monday Security

Cloud Infographic – Cyber Monday Security

Cyber Monday Security This is a time when cybercriminals become opportunists due to the explosive nature of Cyber Monday online shopping. The incredible number of online transactions taking place each second makes it a very lucrative time for these groups. We have provided a timely infographic by zerofox which gives you some ideas of what to…

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising