Category Archives: Security

Cloud Infographic –  DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Juniper Reports Discovers Mobile Commerce Growth Powered By The Cloud

Juniper Reports Discovers Mobile Commerce Growth Powered By The Cloud

Juniper Reports Discovers Mobile Commerce Growth A recently unveiled report from Juniper Research has found that the total number of users who plan to engage in mobile transactions is going to grow considerably over the coming years. They predict that just over 2 billion mobile phone or tablet users will make mobile commerce transactions by…

Internet of things: Poised to be a security headache?

Internet of things: Poised to be a security headache?

IBM’s X-Force Threat Intelligence Quarterly on Monday noted that security threats to the Internet of things are already out there. Firmware can be exploited as well as building systems and the networks that connect end points. IBM proposed a security… Read the source article at ZDNet

Cloud Infographic – The Digital Doppelgängers

Cloud Infographic – The Digital Doppelgängers

The Digital Doppelgängers Cyber crime is rampant and will continue as long as there are opportunities available to maliciously gain from the exploitation of individuals and businesses. Prevention will never be 100% foolproof, but security firms are aggressively looking for solutions in order to help minimize damage caused by the exploits of cyber criminals. Included…

Does the Personalization of the Web Create an Information Bubble?

Does the Personalization of the Web Create an Information Bubble?

Personalization In The Cloud As websites like Facebook, Google and Amazon become more and more personalized, there’s danger to be engulfed in a stream of information that corroborates a person’s worldviews and filters out findings or stories opposed to them, to become trapped in a so-called ‘filter bubble’. Internet activist Eli Pariser, in his book…

How To Define The Internet of Things – Security First

How To Define The Internet of Things – Security First

Define The Internet of Things Given the amount of prose dedicated to the internet of things, it would hardly be foolish to assume that the term is well-defined and well-understood. In reality the opposite is true – professors, tech companies, the media, and individual blogs all disagree on what exactly falls under the umbrella of…

Contributors

Featured Writers

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Cloud and regulation in financial services

Cloud and regulation in financial services

Cloud Regulation When talking about cloud and regulation in financial services, it is important to approach it with a clear understanding of the typical policies that your national regulator will require you to adhere to. Let’s start with outsourcing policy. Cloud mode provides us with a way of outsourcing data centre environments, applications, and services…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter