Category Archives: Security

Cloudera Not Cutting It With Big Data Security

Cloudera Not Cutting It With Big Data Security  Cloudera is, for the moment, a dominating presence in the open source Hadoop landscape; but does it have staying power? While Cloudera’s Big Data platform is the darling of the Hadoop space, they and their open source distribution competitors have so far failed to adequately address the…

HR Security Risk Prevention…

HR Security Risk Prevention… With the rapid adoption of the Cloud by SMEs as well as large enterprises, it has become vital to review and update HR policies to mitigate information security threats that come with this paradigm shift. Cloud systems differ from traditional, in-house IT infrastructure in a way that businesses now have less…

IT Disaster Recovery For SMEs

IT Disaster Recovery For SMEs

IT Disaster Recovery For SMEs According to credible estimates, an hour of outage may cost a medium sized company $70,000. Yes, that is accumulated losses when IT systems go offline. What’s interesting to note here is that in contrast to the popular belief that natural disasters constitute the primary reason for IT system failure, a…

Interested In ERP? Here Are Five Free Information Assets For You

Interested In ERP? Here Are Five Free Information Assets For You

Interested in ERP? Here are Five Free Information Assets for You “He who fails to plan is planning to fail.” – Winston Churchill (1874-1965), iconic statesman and world leader. For any organization desirous of success, planning is crucial. Whether it’s planning for customer demand or regulatory compliance, ERP or Enterprise Resource Planning can help organizations…

Data Encryption For Education

Data Encryption For Education

Data Encryption For Education Schools, colleges and universities are facing data security issues on a regular basis and the nature of their IT systems present unique challenges. Balancing diverse information with required security control is complicated when the IT infrastructure is decentralized and difficult to manage. Adding to these challenges is a diverse user population and…

Is A Private Cloud Really A Cloud?

Is a Private Cloud Really a Cloud? We essentially have two implementation models for cloud computing: the Public cloud, what people call the real cloud, and the Private cloud, which is an implementation of the same elements and infrastructure of a Public cloud on a private level. There are a lot of arguments to be…

Cloud Infographic: BYOD Security And Policies

Cloud Infographic: BYOD Security And Policies

Cloud Infographic: BYOD Security and Policies AccelOps Cloud Security Survey Report surveyed some 176 IT security personnel and they ranked BYOD as the top source for fear of incurring data loss and having the need for heightened data control. This is the traditional topic or cloud worriers and opponents of cloud computing which only helps in propagating the myth that…

Yet Another Vendor Specific Certification, AWS Rolls Out New Certification Program

Yet Another Vendor Specific Certification, AWS Rolls Out New Certification Program

Yet Another Vendor Specific Certification, AWS Rolls Out New Certification Program The lack of specific standards to govern cloud computing, along with security concerns is often one of the reasons cited by those that put it aside in favor of traditional enterprise and datacenter applications. But industry leaders in cloud computing are starting to fill…

Top 5 HIPAA Security Risks As Providers Migrate To The Cloud

Top 5 HIPAA Security Risks As Providers Migrate To The Cloud

Top 5 HIPAA Security Risks As Providers Migrate to the Cloud The HIPAA and HITECH Acts made a huge splash in the healthcare industry as organizations were forced to adapt new safeguards for protected health information, especially in regards to electronic medical records (EMRs). As hospitals migrate to electronic patient health information (ePHI), they must maintain compliance whether they…

Bring Your Own Device (BYOD) – Provides Tremendous Boost In Employee Satisfaction

Bring Your Own Device (BYOD) – Provides Tremendous Boost In Employee Satisfaction Unless one has been living under a rock or has been magically transported from the middle ages, one might have noticed the burgeoning trend in mobile devices. The technology has reached a point where what many would consider science fiction a decade ago,…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising