Category Archives: Security

Cloud Computing And Its Effects On Network Management

Cloud Computing and Its Effects on Network Management The delivery of computing as a service, or cloud computing, over a network is becoming more and more mainstream and is allowing businesses of all sizes to get their applications up and running faster, with easier manageability and less maintenance. Cloud computing allows enterprises, and enables IT,…

Cloud Adoption Statistics

Cloud Adoption Statistics Cloud adoption decisions will be taken in the near future by employees who do not have an IT background. That’s an interesting shift in the IT world! According to a report issued by Capgemini, chief marketing officers, executive and even people from human resource departments, finance or administration departments will be making some of these…

The US Department Of Energy Is Finally Embracing Cloud Technology

The US Department of Energy is Finally Embracing Cloud Technology A new DOE paper explains how national labs can migrate to the cloud without compromising security. I’m sure it won’t come as a shock to anyone in the tech industry (or outside it for that matter) that the US government can be slow to adopt new ideas,…

Making Cloud Adoption In China A Reality (In Spite of Data Privacy and State “Secret” Laws)

Making Cloud Adoption in China a Reality (In Spite of Data Privacy and State “Secret” Laws) Cloud computing has become a hot growth area in China, driven by both large-scale government initiatives and private investment. However, as alluring as the cloud is in China, for foreign firms trying to do business there, the uncertain legal…

Monitorscout.com – A Website And Server Monitoring Service

Monitorscout.com – A Website And Server Monitoring Service

Monitorscout.com – A Website And Server Monitoring Service Monitor Scout is a website and server monitoring company based in Sweden with over 20 external monitoring locations across the globe. Their reliable monitoring solutions cover a wide range of devices and application including websites, servers, networks and web applications can keep downtime to a minimum. Through…

Cloud Infographic: Data Breach Review

Cloud Infographic: Data Breach Review

Cloud Infographic: Data Breach Review The Weaponization of the Cloud Whenever humans invent a new technology, someone is always quick to turn it into a weapon. If anyone thought the Internet and cloud computing might be different, they were wrong. Even with something so abstract as pure information, militaries and cyberterrorists have learned how to…

On-Demand Software Testing Moves To The Cloud

On-Demand Software Testing Moves To The Cloud Although the cloud has become a standard delivery model for many hosted software applications, cloud-based software testing is just hitting its stride. Cloud-based software testing makes test environments and tools accessible to companies that lack the resources, physical space or ongoing need to develop and provision large-scale, internally…

Top 25 Rising European Stars 2012 – Besol Tapp

Top 25 Rising European Stars 2012 – Besol Tapp

Top 25 Rising European Stars 2012 – Besol Tapp …Tapp Scores a Hat Trick via Semi-Autonomous Cloud Management Interface After making it to the prestigious shortlist, the firm’s Chief Executive Officer Hector Rodriguez said:There are the realists and then there are the wannabes. Besol, a startup, just a year-old from Spain is not one of the wannabes,…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter