Category Archives: Security

Press Release: Cloud Security Survey Reveals Lack Of Business Policies Governing Rogue Cloud Usage

Cloud Security Survey Reveals Lack of Business Policies Governing Rogue Cloud Usage Even as Data Protection Remains Highest Concern with the Cloud Forty Percent of Companies Deny Cloud Usage Despite Employee and Departmental Use of Web-Based Applications and Mobile Devices Outside of IT Control Seattle, Wash. – November 6, 2012 – New research tracking trends and…

Presenting The Cloud A Subcategory To Connect With Clients

Presenting The Cloud A Subcategory To Connect With Clients Last week I heard a newscaster announce that the, “cloud” overhanging the economy revolves around what our legislators are going to do about the fiscal cliff. This terminology has nothing to do with the topic of cloud computing but everything to do with our audience’s mental…

Democratizing Business Communications Through The Collaboration Cloud

Democratizing Business Communications Through The Collaboration Cloud This post is sponsored by CIO Collaboration Network and Avaya. In my previous post I wrote about the importance of collaboration in modern business and postulated about possible reasons behind it. Today, I am going to explore a related topic – communications. Now, effective communication is the key to effective collaboration,…

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer (Part 1)

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer (Part 1)

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer Perhaps the strongest reason deterring people from moving their virtual assets to the cloud is the feeling that their data may not be secure there. The IT world is already building myths about security hackers that could and still…

Recent

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Of The Future

Wearable Tech Jobs Wearable Technology is a very exciting industry and the sky’s the limit with new possibilities for businesses and consumers. The new technologies will make our lives easier in terms of convenience, while in other ways more complicated due to learning curve of each new product. Lets take a look at wearable tech in…

How M2M Differs From IoT Internet of Things

How M2M Differs From IoT Internet of Things

What Is M2M Machine To Machine? When it comes to communications between machines, the terms Machine to Machine (M2M) and the Internet of Things (IoT) are seemingly similar to each other. In fact, there is a very strong connection between both terms which is why they are often used as the same. However, that is…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising