Category Archives: Security

Did The NSA Know About Heartbleed?

Did The NSA Know About Heartbleed?

Did The NSA Know About Heartbleed? As the world comes to terms with the full seriousness of the Heartbleed bug, questions are starting to be asked about the role that the National Security Agency (NSA) may have played in the security flaw. On the morning of Friday 11th April rumours started to circulate on social media…

Cloud Infographic: Data Security Risk And Prevention

Cloud Infographic: Data Security Risk And Prevention

Cloud Infographic: Data Security Risk And Prevention Cloud Security Tips Cloud computing inherits the security issues pertaining in the technologies that it uses, which consists chiefly of the risk of a breach in the integrity or confidentiality of information. One security measure is encrypting stored data, but there are drawbacks with encryption and it does…

WordPress Hosting Security Tips

WordPress Hosting Security Tips If you have a WordPress website, you may be concerned about the security of your website. In the following article, I will supply you with some tips you can use to ensure your website is secure. Nothing is more important to website management than security. If you haven’t taken steps to secure…

Top Cloud Gaming Solutions For Small Developers

Top Cloud Gaming Solutions For Small Developers

Top Cloud Gaming Solutions For Small Developers Last month, we posted an article dealing with the question of whether or not indie game publishers would someday rival their AAA-developer counterparts. If you have had a chance to read it, chances are that by now you realize just how powerful the indie-gaming industry is, as well…

The Power Of Tagging In The Cloud

The Power Of Tagging In The Cloud

The Power Of Tagging In The Cloud When people wish to identify friends and acquaintances on Facebook or in Twitter photos, they use a feature called tagging, which, as we all know, identifies the person by name and thus allows the photo to form part of any search that includes that name. The same technique…

The Database Wars 2.0

The Database Wars 2.0

The Database Wars 2.0 The IT world is undergoing a major shift. The way companies and individuals use and interact with their technology has been relatively constant since the emergence of the internet and traditional network servers in the mid-1990s, but the rapid growth in cloud computing and ever-increasing availability of large data centre means…

WordPress Security Plugin Recommendations

WordPress Security Plugin Recommendations

WordPress Security Plugin Recommendations WordPress is a widely used website platform used by millions of people around the world. WordPress is popular because it provides an extremely easy platform for application developers to use to create convenient layouts. But because of its popularity, WordPress is frequently the target of attacks by hackers. To maximize security…

Recent

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

The Lighter Side Of The Cloud – Day 5

The Lighter Side Of The Cloud – Day 5

By David Fletcher Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates.

Sponsored Posts

The Many Hats Of Today’s IT Managers

The Many Hats Of Today’s IT Managers

The Many Hats of IT Managers In years past, the IT department of most large organizations was much like a version of Middle Earth: a mysterious nether world where people who seemed infinitely smarter than the rest of us bustled around, speaking and typing languages that appeared indecipherable, yet, which made our world work. They…

cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising