Category Archives: Security

IBM Helps Make “Bring Your Own” Cloud Apps Safe For Work

IBM Helps Make “Bring Your Own” Cloud Apps Safe For Work

Cloud Apps Safe For Work One-third of Fortune 1000 Employees Share Sensitive Company Data with Third-Party Apps; IBM Cloud Security Enforcer Helps Organizations to See, Manage and Secure Usage Across Public and Hybrid Cloud Environments ARMONK, New York – September 18, 2015 – IBM today announced new cloud security technology that helps safeguard the increasing use…

Beware The Random Element In Big Data

Beware The Random Element In Big Data

Big Data Analytics In 1983, author Isaac Asimov published a remarkable science fiction anthology called Foundation. Its central theme was the use of mathematical models to envision the progress of civilization and to establish appropriate benchmarks for its successful continuance over thousands of years. In essence, the book focused on big data as the driving…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Datacenter Disaster Recovery & Microsoft Azure

Datacenter Disaster Recovery & Microsoft Azure

Datacenter Disaster Recovery Microsoft Azure, one of the largest cloud computing platforms and infrastructures, was created for building, deploying and managing services and applications through a Microsoft-managed and partner hosted global network of data centers. With Azure Site Recovery storing VM snapshots in the cloud and allowing failover to them, it’s no surprise that Azure…

Cloud Pinup: Threat Stack – Provides Added Security

Cloud Pinup: Threat Stack – Provides Added Security

Threat Stack’s Innovative ‘Oversight’ Service Leading cloud security company Threat Stack has launched an exciting new service ‘Oversight’ that promises to add a highly-effective layer of automated security monitoring services. Oversight aims to provide real-time and continuous monitoring of a company’s assets, and to warn customers of potential security threats as they emerge, giving security…

The Dark Side Of Wearable Tech Use

The Dark Side Of Wearable Tech Use

Wearable Tech Wearable technology or gadgets are a category of technological and state-of-the-art devices that can be worn by consumers to monitor and track information with regards to fitness and health. However, while wearable technology is known to have provided many benefits for consumers in the past, recent studies have shown there is a darker…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising