Category Archives: Security

Better Data Risk Mitigation For SaaS Providers

Better Data Risk Mitigation For SaaS Providers

Better Data Risk Mitigation for SaaS Providers We live in a world that is rife with internal-controls breakdowns that result in security and data breaches, which can cause tremendous business and reputational damage for organizations. The rise of cloud computing systems has now created an even greater need for organizations to develop the right controls…

How Cloud Services Have Changed The Mindset Of Outsourcing

How Cloud Services Have Changed The Mindset Of Outsourcing

How Cloud Services Have Changed the Mindset of Outsourcing The business of information technology outsourcing has been dominated by sizable companies such as IBM, CSC, ASC and others that provide a comprehensive line card of IT services.  These mammoth outsourcers were viewed as a one-stop-shop delivering IT services ranging from level-1 help desk to level-3…

Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization Is Revolutionizing “File Sync And Share” Services

Consumerization is revolutionizing “file sync and share” services for the highly regulated asset management industry. The Bring Your Own Device (BYOD) movement has gained significant popularity in the corporate world and is rapidly changing how enterprises share information. Consumerization of devices in asset management – the migration of features, feel and functionality of mainstream consumer…

Algosec Study: Examining The Impact Of Security Management On The Business

Algosec Study: Examining The Impact Of Security Management On The Business

The Impact of Security Management on the Business Survey of 240 information security professionals, network operations and application owners at organizations worldwide. Included is a recent  survey provided courtesy of the group over at Algosec.com A key finding in the study shows that many organizations have yet to migrate a significant percentage of their business…

Plan Ahead For A Successful Cloud Migration

Plan Ahead For A Successful Cloud Migration

Migrating your information systems to the cloud can be a complex process. However, the factors most attributable to the success of the project are not. By addressing these issues well in advance, you will avoid many of the pitfalls that can derail migration projects. Below are some questions to ask before you initiate the project.…

Cloud Startup: Zuora – Helping Businesses Shift To Subscription-Based Sales

Cloud Startup: Zuora – Helping Businesses Shift To Subscription-Based Sales

Startup Zuora: Helping Businesses Shift To Subscription-Based Sales Via Their SaaS AndThe Cloud Over the years, there has been an evolution of how companies sell products; especially as companies are building new business models to reflect the changing commerce world with online sales and such. Seeing as startups are building from the ground up integrating a…

Business Versus Technical Cloud Brokers And Why It Matters

Business Versus Technical Cloud Brokers And Why It Matters

Business versus Technical Cloud Brokers and Why it Matters Gartner predicts “By 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages, rather than directly, up from less than 5% today.” Thus, it is important to understand what a cloud broker is and what they do; however,…

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter