Category Archives: Security

New AlgoSec Survey Reveals Huge Challenge To Unify Security Policy Management

New AlgoSec Survey Reveals Huge Challenge To Unify Security Policy Management

New AlgoSec Survey Reveals Huge Challenge to Unify Security Policy Management Across On-Premise and Public Cloud Environments  Survey Highlights Need to Increase Visibility, Create New Workflows and Compliance Processes, and Reconsider Team Responsibilities to Secure Network Access in a Hybrid Environment Boston, MA – (September 30, 2014) – AlgoSec, the market leader for Security Policy…

Cloud Infographic – History Of Computer Threats

Cloud Infographic – History Of Computer Threats

Cloud Infographic – History Of Computer Threats We’d like to close out the week by providing you with an infographic courtesy of Dell which presents a fast-fact look at The History of Computer Security Threats. Security threats are constant, in many cases extremely calculated and inevitably unforgiving. There will most likely never be a 100% foolproof…

Securing the Internet of Things

Securing the Internet of Things

The new Mini ad reads, “High-Speed Mobile Device” and touts the car's “digital hub that syncs with your devices and social networks. So now you can motor like the wind and tell everyone all about it.” Cars are just one of the everyday objects slated to … Read the source article at forbes.com

Cloud Infographic –  European Locations For IT Infrastructure

Cloud Infographic – European Locations For IT Infrastructure

Cloud Infographic –  European Locations For IT Infrastructure With weariness about data laws in the U.S. growing among enterprises, many are opting to host their data in European countries. According to a survey by ResearchNow, commissioned by Peer1 Hosting, the data sovereignty issue is so important that 70% of U.S. businesses would give up some…

Stopping Multi-Platform Cloud Problems Before They Start

Stopping Multi-Platform Cloud Problems Before They Start

The hybrid cloud continues to gain traction as a viable option for companies looking to realize the economic benefits of cloud while still retaining a level of security and comfort that comes from their existing infrastructure for mission critical applications. But creating and maintaining separate platforms comes with its own set of problems – not…

Information Security Breach – When does Yours Take Place?

Information Security Breach – When does Yours Take Place?

It seems that security breaches are becoming a daily occurrence. At least in how frequently they are being reported.  In the last few days we heard more regarding Home Depot, and just yesterday there was a story regarding eBay. I wonder who else will be in the press later this week.  As I went to…

Choosing Cloud For Crime Mapping

Choosing Cloud For Crime Mapping

“He, who does not prevent a crime when he can, encourages it.” – Seneca Computer-based crime mapping has been around for thirty or forty years. Computerized crime mapping was struggling to prove its legitimate use until 1980’s. The use of maps for crime analysis dates back to 1800’s. Naturally enough, crime mapping was first applied…


CloudTweaks Sponsors - Find out more!

Contributors

Featured Writers

What Should SMEs Do To Prevent Common Mistakes?

What Should SMEs Do To Prevent Common Mistakes?

Spending And Planning Wisely Overview – Billions of pounds from valuable IT and communication (ICT) budgets are wasted each year due to common mistakes in the market. These are some of the pitfalls you should avoid. With small businesses (especially start-ups with online ambitions) relying more and more on their understanding and utilisation of ICT, it’s…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…


Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021
contact@cloudtweaks.com

Join our newsletter