Category Archives: Security

From Startup To Becoming Enterprise Grade

From Startup To Becoming Enterprise Grade

Becoming Enterprise Grade How can an emerging business make a successful transition from selling to SMB customers that fueled their early growth to the enterprise customers that enable long-term profitability? What works with SMB customers often won’t get you a seat at the enterprise table. To make deep inroads into enterprise accounts, you have to…

The Lighter Side Of The Cloud – Taking The Wheel

The Lighter Side Of The Cloud – Taking The Wheel

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our comics to generate leads to a specific landing page, newsletter, presentation or social media campaign,…

Cloud Spectator Releases The 2016 Top Ten Cloud Vendor Benchmark Report

Cloud Spectator Releases The 2016 Top Ten Cloud Vendor Benchmark Report

Top Ten Cloud Vendor Benchmark Report Report Uncovers A Staggering 350% Performance Difference Between The Top 10 Cloud Service Providers BOSTON, MA. JANUARY 13, 2016 – Cloud Spectator, the industry leading IaaS cloud benchmarking agency, today released the Top Ten Cloud Vendor Benchmark 2016 Report, a price-performance analysis of the leading public IaaS (Infrastructure-as-a-Service) vendors in…

The Soft-Edged Cloud: A Security Challenge

The Soft-Edged Cloud: A Security Challenge

The Cloud Security Challenge The use of the term “cloud” to describe global, offsite, computing and storage technology is apt for a number of reasons; not all of them good. The metaphor succeeds largely when people visualize their data hovering over their heads, no longer tied to a single location, and consequently easy to access…

Security Survey: Enterprises Unequipped To Detect And Deal With Attacks

Security Survey: Enterprises Unequipped To Detect And Deal With Attacks

Security Survey: Many Enterprises Still Unequipped Today’s information security teams are expected to mitigate risk in environments where employees are accessing critical and confidential data from anywhere, at any time. The network perimeter has expanded to include cloud services, mobile devices, and global forces that encompass partners and contractors, making it impossible to completely lock down…

Trends: The CIO’s Business Card – Chief Productivity Officer

Trends: The CIO’s Business Card – Chief Productivity Officer

The Chief Productivity Officer After years of enterprises hesitating to migrate their applications and data stores to the cloud, it’s safe to say the debate is over and the cloud is here to stay. IDC even goes as far as to predict that by 2020, we will stop referring to clouds as “public” and “private,”…

Cloud Traffic Growth And Content as a Service (CaaS)

Cloud Traffic Growth And Content as a Service (CaaS)

Content as a Service (CaaS) Content as a Service (CaaS) is a relatively new take on content management systems (CMS). While traditional web content management systems like Drupal and WordPress offer one-stop-shop solutions for both creating websites and managing content, CaaS service providers narrow their focus to pure content management, disregarding the output channels such…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor