Category Archives: Security

Global Leaders In Malware And Malicious C2 Traffic

Global Leaders In Malware And Malicious C2 Traffic

Malware and Malicious C2 Traffic Nearly half of all malware threats in the past three months originated in the US, while both the US and China are global leaders when it comes to malicious command and control (C2) traffic. This was revealed in the latest quarterly report from NTT Group security company Solutionary released this…

Domain Shadowing – Wild West Of Internet Cyber Attacks

Domain Shadowing – Wild West Of Internet Cyber Attacks

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from Bromium Labs, security analysts, that study key trends in the cyber attack landscape and specialize…

Smart Watches And Cyber Security Concerns

Smart Watches And Cyber Security Concerns

Smart Watches Vulnerable To Cyber-Attack The recent epidemic of cyber attacks has led to increased investment and spending on security. But still, hackers have the upper hand. They can hack your computer, mobile, iPad, Internet-connected vehicle, and even your smart watch. According to HP, Smart watches with network and communication functionality represent a new and…

Cloud Security Alliance (CSA) Las Vegas Security Event

Cloud Security Alliance (CSA) Las Vegas Security Event

Keynotes Set For Upcoming Cloud Security Alliance Congress Schedule of Workshops, Trainings and Certifications to Compliment Session Line Up at the only Data Privacy and Cloud Security Conference Featuring Best-in-Class Education and Networking The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a…

New Approach Addresses Cybersecurity Challenges For The IoT

New Approach Addresses Cybersecurity Challenges For The IoT

Cybersecurity Challenges For The IoT The traditional approach to cybersecurity is to assume trust and then take steps to manage what isn’t trusted. But as the concept of an industrial Internet of Things (IIoT) gains momentum, one of the primary challenges facing businesses is safeguarding connections between information technology (IT) and operational technology (OT). With…

Google Glass – The Good, The Bad & The Ugly

Google Glass – The Good, The Bad & The Ugly

Google Glass Though only available to a tiny percentage of the world’s population and criticized as ‘dead’, Google Glass appears, in fact, to be alive and well in the enterprise, with a recent announcement that Google is planning to distribute Glass ‘Enterprise Edition’ through Glass for Work partners. 9To5Google reports that this new edition will…

Risks Of Virtualization In Public And Private Clouds

Risks Of Virtualization In Public And Private Clouds

Risks Of Virtualization Server virtualization is one of the cornerstone technologies of the cloud. The ability to create multiple virtual servers that can run any operating system on a single physical server has a lot of advantages. These advantages can appear in public, Infrastructure as a Service (IaaS), as well as in private clouds. However,…

Data Violations – Record Year For Data Breaches

Data Violations – Record Year For Data Breaches

Record Year For Data Breaches The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and last month Ars Technica discussed in detail the information breach at the U.S. Government’s Office of Personnel Management. MSPmentor‘s current IT security news includes the…

CDN Performance Report – Month of June – 2015

CDN Performance Report – Month of June – 2015

CDN Performance Report Each month CloudTweaks will be providing a series of benchmark testing performance reports conducted by our contributing partners. The first in our series will be on (CDN) Content Delivery Networks which is a growing industry whose customers are primarily web based companies looking for that extra layer of site protection and speed.…