Category Archives: Security

Vendors To Enter The Cyber Security Game

Vendors To Enter The Cyber Security Game

IT Regulatory Compliance as the Next Big Focus for Cloud Vendors Back in October 2014, Defense Information Systems Agency (DISA) submitted a public request for information, calling for the assessment of the marketplace’s ability to “provide cloud ecosystems and services in two integration models that place vendor cloud services on DoD networks for use by…

Malware And The Opportunistic Holiday Season Bonanza

Malware And The Opportunistic Holiday Season Bonanza

‘Tis The Season To Be Careful Malware Vulnerabilities Earlier this year, Menlo Security published a report suggesting that one-third of the top million global websites were vulnerable to malware, and one in five sites were running software with known vulnerabilities. 5% of the sites measured were identified as serving spam or malware or were part…

The Profound Effects Of Virtualization Software And DRaaS

The Profound Effects Of Virtualization Software And DRaaS

Disaster Recover As A Service (DRaaS) As a technologist, I am constantly thinking about leveraging the latest software or hardware to provide solutions to problems. My latest thoughts revolve around disaster recovery and Disaster Recovery as a Service (DRaaS), and how it can be made more accessible to the masses. What is DRaaS?  Before diving…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

Cloud Computing vs. “Cord” Computing

Cloud Computing vs. “Cord” Computing

Easily Managing Access And Authentication To Both Though end users might not notice a difference between systems and applications hosted on-site or in the cloud at their organization, administrators who manage them often have to do so quite differently. Each solution has different requirements pertaining to security, and access and authentication management. System admins want…

Building Your Business Cloud Strategy

Building Your Business Cloud Strategy

Cloud Brokers And Strategies  Comprehensive digital transformation of your business will require extensive involvement of your CIO through each level of business evolution, ensuring data is protected and efficiently utilizing in-house IT infrastructure for maximum effect in hybrid cloud models. Flexibility is integral to the design, and instead of fitting into an as-built service, developing…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor