Category Archives: Security

What Did Cyber Week Achieve?

What Did Cyber Week Achieve?

What Did Cyber Week Achieve? Last week’s “Cyber Week” was all about cybersecurity and the ongoing threat of cyber attacks against the federal government, non-profits and private companies in the US. But what did it achieve? Ultimately, two new bills were passed by the House both aiming to enable both companies and government to withstand…

The Sexy Data Scientist

The Sexy Data Scientist

The Sexy Data Scientist According to the Harvard Business Review, Data Scientist is the sexiest job of the 21st Century. Dry sounding as they are, competent data scientists are much sought-after, particularly as ingenuity, curiosity and creativity are attributes any successful data manager will need. In order to make the most of big data, companies…

3 Essentials For IoE Security — And A Proven Approach To Them

3 Essentials For IoE Security — And A Proven Approach To Them

3 Essentials For IoE Security  The Internet of Things (also called the Internet of Everything) is quickly becoming the new normal – with the expectation that anything and everything will be interconnected in our global village and united by the cloud. With an estimated 50 billion connected devices, processes and systems in the IoE by…

Accounting Firms And Data Security

Accounting Firms And Data Security

Accounting Firms And Data Security With the growth of cloud computing, social media, and SaaS, accounting firms have found new ways to collaborate and conduct business with their clients. Unknowingly, much of the data now resides in the cloud. Cloud computing has provided these accountants an opportunity to work anytime and anywhere with increased flexibility.…

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

Cloud Infographic – Working Toward A Positive Cloud Experience

Cloud Infographic – Working Toward A Positive Cloud Experience

Positive Cloud Experience Cloud computing offers tremendous value to Enterprise businesses and even allows small and medium businesses to compete by providing solutions that were previously out of reach because of the cost. Here are five ways to help you find the best cloud solutions for your business. Security is one of the biggest concerns in…

IT Security – Are YOU At Risk?

IT Security – Are YOU At Risk?

IT Security Concerns If you’re a regular reader of this site, you don’t need to be told how important IT security and risk management is for businesses big and small. For whatever reason, many small to medium sized enterprises (SME’s) don’t seem to have gotten this memo. It’s a good thing there is a fair…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising