Category Archives: Security

Sony Pictures computer system hacked

Sony Pictures computer system hacked

Sony Pictures Entertainment has been targeted by computer hackers in an attack which reports say has forced the company to shut down its corporate network. Read the source article at BBC – Homepage

Shared Responsibilities for Security in the Cloud, Part 1

Shared Responsibilities for Security in the Cloud, Part 1

When businesses owned their applications and all underlying infrastructure, they also owned their security. Now this is changing with a shift in ownership and operational responsibilities over many applications as they are moving to the Cloud. In the cloud era, security is not owned solely by the cloud service provider (CSP) or consumer. Cloud security…

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud  In theory, migrating to cloud computing should be easy. Choose a cloud provider, move the files to the data server and everything is good to go. While that may work for the personal cloud, migrating into a business cloud format is a lot more complicated. As Ann Bednarz pointed out…

Cloud Infographic – CloudTrends Report 2014

Cloud Infographic – CloudTrends Report 2014

CloudTrends Report 2014 Report finds that enterprise-managed services for greater visibility, control, QoS and security of cloud applications are on the rise Key findings of the Allot CloudTrends Report include: Over 45% of CSPs are offering public cloud applications and services for enterprises ranging from basic email and storage to fully-fledged unified communications, CRM and…

Cloud Infographic –  DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Juniper Reports Discovers Mobile Commerce Growth Powered By The Cloud

Juniper Reports Discovers Mobile Commerce Growth Powered By The Cloud

Juniper Reports Discovers Mobile Commerce Growth A recently unveiled report from Juniper Research has found that the total number of users who plan to engage in mobile transactions is going to grow considerably over the coming years. They predict that just over 2 billion mobile phone or tablet users will make mobile commerce transactions by…

Internet of things: Poised to be a security headache?

Internet of things: Poised to be a security headache?

IBM’s X-Force Threat Intelligence Quarterly on Monday noted that security threats to the Internet of things are already out there. Firmware can be exploited as well as building systems and the networks that connect end points. IBM proposed a security… Read the source article at ZDNet

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising