Category Archives: Security

Cloud Infographic: Cybercrime

Cloud Infographic: Cybercrime

Cloud Infographic: Cybercrime To close out this weeks coverage on Cloud security and Cybercrime, we’ve opted to include an older infographic which sums up this week nicely entitled: “Are You A Hacker’s Target?“. This infographic is provided courtesy of Solera Networks. Infographic Source: Solera Networks

Cloud Startup: How AppZero Can Help!

Cloud Startup: How AppZero Can Help!

Most Businesses Have Transitioned To The Cloud, But Not Everyone – AppZero Can Help! While over half of U.S. businesses currently use cloud computing in some way or another, there are still so many out there who have not yet jumped on board. It isn’t that surprising, though, considering just how complicated it can be…

Cloud Security Alliance Annual EMEA Congress Discussions

Cloud Security Alliance Annual EMEA Congress Discussions

Cloud Security Alliance Annual EMEA Congress Discussions It was as cloudy as Edinburgh could be in the autumn, when the “Cloud Security Alliance Annual EMEA Congress” featuring about 300 Cloud Computing stake-holders, gathered for the event that was held during the last week of September, produced By MISTI Europe. The variety of organizations participating demonstrated the…

4 Tools To Help Enable A Successful Cloud Computing Experience

4 Tools To Help Enable A Successful Cloud Computing Experience

4 Tools To Help Enable A Successful Cloud Computing Experience Since the introduction of the cloud, “business as usual” has transformed. This technology has allowed companies to better their IT performances, and ultimately, their services for consumers. Just a few years ago, the cloud was a nearly incomprehensible concept to the world. Now, nearly every…

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index

Cloud Infographic: 2013 Cyber Security Intelligence Index Based on daily monitoring of security for more than 4,000 clients, IBM has determined that DDoS attacks are on the rise. The average large company must filter through 1,400 cyber attacks weekly according to the IBM Cyber Security Intelligence Index. But many organizations do not have the on-site…

CloudBerry Lab Takes You To The Glacier

CloudBerry Lab Takes You To The Glacier

CloudBerry Lab Takes You To The Glacier The world of data management and storage continues to change and flex as it enters the realm of the cloud, with sophisticated technologies running in a never-ending horse-race against the increased demands of the end users. One constant remains:  people need access to data, and they also need…

Firehost Reveals Increases In Cyberattacks In Its Superfecta Report

Firehost Reveals Increases In Cyberattacks In Its Superfecta Report

Firehost Reveals Increases in Cyberattacks in its Superfecta Report There are always wolves at the door, and they are relentless in both their creativity and determination when it comes to getting in. This is the message that can be gleaned from a report released Tuesday October 22, by FireHost, (www.firehost.com) a provider of managed, secure…

Virtualization As A Key Component Of Cloud Computing

Virtualization As A Key Component Of Cloud Computing

Virtualization as a key component of cloud computing Virtualization is one of the key components of the cloud computing paradigm, especially in infrastructure as a service model where the mentioned technology is essential to provide a large set of computing resources. Some experts even define cloud computing as simple as virtualized hardware and software plus…

Why NSA Revelations Will Be Good For Cloud Security

Why NSA Revelations Will Be Good For Cloud Security

Why NSA Revelations Will Be Good For Cloud Security Edward Snowden’s recent disclosures, including concerns about the NSA’s ability to break certain types of encryption, and the extent of surveillance on cloud service providers, put the entire cloud industry into an uproar. The bad news is that this has eroded companies’  trust that their data…

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts receiving Distributed Denial of Service (DDoS) attacks that are carefully timed to re-strike just as their systems start to repair themselves. The attacks are carried out by waves of botnet…

Promises, Promises: Has The ERP Promise Finally Become A Reality?

Promises, Promises: Has The ERP Promise Finally Become A Reality?

Promises, Promises: Has the ERP Promise Finally Become a Reality? “You made me promises, promises you knew you’d never keep. Promises, promises why do I believe?” Those of us fortunate, or unfortunate, enough to enjoy the 80’s may remember these lyrics.  The lyrics could have been about the state of ERP before Cloud ERP came…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising