Category Archives: Security

New AlgoSec Survey Reveals Huge Challenge To Unify Security Policy Management

New AlgoSec Survey Reveals Huge Challenge To Unify Security Policy Management

New AlgoSec Survey Reveals Huge Challenge to Unify Security Policy Management Across On-Premise and Public Cloud Environments  Survey Highlights Need to Increase Visibility, Create New Workflows and Compliance Processes, and Reconsider Team Responsibilities to Secure Network Access in a Hybrid Environment Boston, MA – (September 30, 2014) – AlgoSec, the market leader for Security Policy…

Cloud Infographic – History Of Computer Threats

Cloud Infographic – History Of Computer Threats

Cloud Infographic – History Of Computer Threats We’d like to close out the week by providing you with an infographic courtesy of Dell which presents a fast-fact look at The History of Computer Security Threats. Security threats are constant, in many cases extremely calculated and inevitably unforgiving. There will most likely never be a 100% foolproof…

Securing the Internet of Things

Securing the Internet of Things

The new Mini ad reads, “High-Speed Mobile Device” and touts the car's “digital hub that syncs with your devices and social networks. So now you can motor like the wind and tell everyone all about it.” Cars are just one of the everyday objects slated to … Read the source article at forbes.com

Cloud Infographic –  European Locations For IT Infrastructure

Cloud Infographic – European Locations For IT Infrastructure

Cloud Infographic –  European Locations For IT Infrastructure With weariness about data laws in the U.S. growing among enterprises, many are opting to host their data in European countries. According to a survey by ResearchNow, commissioned by Peer1 Hosting, the data sovereignty issue is so important that 70% of U.S. businesses would give up some…

Stopping Multi-Platform Cloud Problems Before They Start

Stopping Multi-Platform Cloud Problems Before They Start

The hybrid cloud continues to gain traction as a viable option for companies looking to realize the economic benefits of cloud while still retaining a level of security and comfort that comes from their existing infrastructure for mission critical applications. But creating and maintaining separate platforms comes with its own set of problems – not…

Information Security Breach – When does Yours Take Place?

Information Security Breach – When does Yours Take Place?

It seems that security breaches are becoming a daily occurrence. At least in how frequently they are being reported.  In the last few days we heard more regarding Home Depot, and just yesterday there was a story regarding eBay. I wonder who else will be in the press later this week.  As I went to…

Choosing Cloud For Crime Mapping

Choosing Cloud For Crime Mapping

“He, who does not prevent a crime when he can, encourages it.” – Seneca Computer-based crime mapping has been around for thirty or forty years. Computerized crime mapping was struggling to prove its legitimate use until 1980’s. The use of maps for crime analysis dates back to 1800’s. Naturally enough, crime mapping was first applied…

Contributors

Featured Writers

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Cloud and regulation in financial services

Cloud and regulation in financial services

Cloud Regulation When talking about cloud and regulation in financial services, it is important to approach it with a clear understanding of the typical policies that your national regulator will require you to adhere to. Let’s start with outsourcing policy. Cloud mode provides us with a way of outsourcing data centre environments, applications, and services…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter