Category Archives: Security

Press Release: Q2 2012 FireHost Web Application Attack Report Shows Sharp Rise In SQL Injections

17 million cyber-attacks blocked between April and June by secure cloud hosting provider London, UK – July 24, 2012 – Secure cloud hosting company, FireHost, has today revealed the latest statistical analysis of attacks successfully blocked by its servers located at data centers in the US and Europe.  During the period of April to June 2012,…

Q&A With Chris Hale: Cloud Master Data Management

Q&A With Chris Hale: Cloud Master Data Management

Q&A with Chris Hale We caught up with Chris Hale, VP of Global Product Marketing for Liaison Technologies, to get his take on why the cloud is making the adoption of master data management (MDM) more feasible for mid-market companies, as well as opening new opportunities for global enterprises. Historically, only large enterprises have adopted…

Mobile Cloud Computing: The Next Logical Evolution

Mobile Cloud Computing: The Next Logical Evolution Mobile Cloud Computing (MCC) is the next logical evolution for cloud computing. Though mobile technology is still evolving, especially the operating systems, it is doing so in a very rapid pace. Most modern mobile devices are now sporting capable web browsers mainly due to advances in mobile operating…

The Real Value Of Cloud Storage

The Real Value Of Cloud Storage

Value Of Cloud Storage Many businesses are learning about the many advantages of the cloud, but most of them do not understand the true value of cloud computing and cloud storage. Although many providers like to talk about certain aspects of the cloud that sound good at first, they tend to ignore the kinds of…

Caring About The Client End Point In A Cloud

Caring About The Client End Point In A Cloud

Caring About The Client End Point In A Cloud In a cloud infrastructure, should one care about the client end point?  One of the key enabling factors for the enterprise mobility of an organization is the cloud-technology-based model. However, most of the real access is from practical devices such as smartphones, desktop PCs, etc. However,…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising