Category Archives: Security

Cloud Infographic – Stormy In The Cloud

Cloud Infographic – Stormy In The Cloud

Stormy In The Cloud Provided is an infographic with some concerning statistics by Safenet regarding IT security. 47% of respondents said the IT security team are hardly involved in the decision making process. 44% of corporate data stored in a cloud environment is not managed or controlled by the IT department. Only 34% of companies have policies…

Do Organisations Face A Security Risk From Apps?

Do Organisations Face A Security Risk From Apps?

Yesterday we looked at the growing area of Shadow IT within organisations. We concluded that even though Shadow IT has the potential to be a force for good, there is still a significant threat posed by the usage of apps that do not align with a company’s security, compliance, reliability, documentation or control. How much…

Shadow IT – Threat or Opportunity?

Shadow IT – Threat or Opportunity?

Shadow IT Shadow IT – sometimes referred to as Stealth IT – describes the usage of IT systems and solutions that are built and used inside businesses and organisations without explicit approval from IT departments and/or management. Fueled by the growth of BYOD policies, Christopher Rentrop, Professor of Informatics at Konstanz University of Applied Sciences, believes…

Cloud: Enabling Virtualised Banking Environments

Cloud: Enabling Virtualised Banking Environments

Enabling Virtualised Banking At the outset it is important to understand where cloud will fit into the existing banking landscape and in order to do so, one must first recognize that the biggest development of recent times is the complete transformation and virtualisation of traditional banking services. Emphasis is on the digitisation of products and…

Potential Security Flaws Detected With Medical Devices

Potential Security Flaws Detected With Medical Devices

Potential Security Flaws Detected There have always been concerns when it comes to security and the cloud. It is especially troubling when it involves the security of medical devices.  As reported by news agency Reuters. The U.S. Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices and…

Cloud Computing Meets The Smart Electricity Grid

Cloud Computing Meets The Smart Electricity Grid

The Smart Electricity Grid New research makes possible time-variable pricing of cloud services based on variably-priced power from a smart grid Cloud computing data centers often consume energy at the rate of megawatts, like other large industrial systems. Large consumers of electricity likewise often have to deal with time-varying pricing of electrical power from suppliers,…

Cloud Infographic: The True Cost Of Downtime

Cloud Infographic: The True Cost Of Downtime

So what’s the true cost of downtime? A third of websites experience downtime every month, and 90% of organizations have unexpectedly lost access to their critical systems. Website outages can last, on average, 7.9 hours in North America and 10.3 hours in Europe. For a society so dependent on connectivity such outages are extremely costly…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising