Category Archives: Security

Cloud Security Alliance Releases New Big Data Taxonomy Report

Cloud Security Alliance Releases New Big Data Taxonomy Report

Cloud Security Alliance Releases New Big Data Taxonomy Report SAN JOSE, Calif., Sept. 18, 2014 /PRNewswire-USNewswire/ — CSA Congress 2014 – The Cloud Security Alliance (CSA) Big Data Working Group today released the Big Data Taxonomy Report, a new guidance report that aims to help decision makers understand and navigate the myriad choices within the…

How The Cloud Has Brought About A Significant Improvement

How The Cloud Has Brought About A Significant Improvement

How The Cloud Has Brought About A Significant Improvement You know, the cloud has assumed control when even the most hesitant of businesses – lawful, monetary – talk about far reaching private mists, particularly for their industry. It appeared for quite a while that the conventional explanations behind moving to the cloud, i.e. decreased expense,…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Smartphone Security And The Potential Pitfalls

Smartphone Security And The Potential Pitfalls

Smartphone Security And The Potential Pitfalls Smartphones, with advanced computing ability and connectivity, have dramatically changed the computing landscape. Smartphones run complete operating system software that provides a standardized interface and platform for a large number of applications in the marketplaces such as the Apple App Store, Android Market, and Amazon App Store. Android Market…

Cloud Infographic: Not Everything Is Locked Up Within A Secured Network

Cloud Infographic: Not Everything Is Locked Up Within A Secured Network

“Hackers are breaking the systems for profits. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is a big business.”  Kevin Mitnick It is a common knowledge that the more science and technology develop, the more they become fraught with both good and evil. In our modern times, billions…

Android Smartphone Security And Instagram App Testing

Android Smartphone Security And Instagram App Testing

Android Smartphone Security And Instagram App Testing Our daily lives become more and more dependent on smartphones due to their high processing power and increased capabilities. Smartphones have features of both a mobile phone and a computer, allowing us to talk, text, tweet, email, browse the Internet, make purchases, manage bank accounts, and take pictures.…

Contributors

Featured Writers

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Cloud and regulation in financial services

Cloud and regulation in financial services

Cloud Regulation When talking about cloud and regulation in financial services, it is important to approach it with a clear understanding of the typical policies that your national regulator will require you to adhere to. Let’s start with outsourcing policy. Cloud mode provides us with a way of outsourcing data centre environments, applications, and services…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter