Category Archives: Security

Overcoming Obstacles In Cloud Computing Adoption

Overcoming Obstacles In Cloud Computing Adoption

Overcoming The Numerous Challenges According to Buyya et al. (2008), “A Cloud is a type of parallel and distributed system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources based on service-level agreements established through negotiation between the service provider and consumers.” The enormous…

Move to Cloud Not Slowing, but Security Concerns Linger

Move to Cloud Not Slowing, but Security Concerns Linger

WAYNE, Pa., Oct. 2, 2014 /PRNewswire/ — The swift migration to cloud computing and data recovery services shows no signs of slowing, with half of organizations reporting they expect to boost their cloud services budgets over the next 18 months, according to a new study conducted by IDG Research Services on behalf of Sungard® Availability…

New AlgoSec Survey Reveals Huge Challenge To Unify Security Policy Management

New AlgoSec Survey Reveals Huge Challenge To Unify Security Policy Management

New AlgoSec Survey Reveals Huge Challenge to Unify Security Policy Management Across On-Premise and Public Cloud Environments  Survey Highlights Need to Increase Visibility, Create New Workflows and Compliance Processes, and Reconsider Team Responsibilities to Secure Network Access in a Hybrid Environment Boston, MA – (September 30, 2014) – AlgoSec, the market leader for Security Policy…

Cloud Infographic – History Of Computer Threats

Cloud Infographic – History Of Computer Threats

Cloud Infographic – History Of Computer Threats We’d like to close out the week by providing you with an infographic courtesy of Dell which presents a fast-fact look at The History of Computer Security Threats. Security threats are constant, in many cases extremely calculated and inevitably unforgiving. There will most likely never be a 100% foolproof…

Securing the Internet of Things

Securing the Internet of Things

The new Mini ad reads, “High-Speed Mobile Device” and touts the car's “digital hub that syncs with your devices and social networks. So now you can motor like the wind and tell everyone all about it.” Cars are just one of the everyday objects slated to … Read the source article at forbes.com

Contributors

Featured Writers

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs. However moving from legacy to the cloud environment has its…

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter