Category Archives: Security

It Takes a Village to Raise a Cloud

It Takes a Village to Raise a Cloud

The Community Cloud “We are special. We have unique needs. Our demands for compliance and security go way above your average organization. There is no way we are going to put our precious data in a public cloud. It is just a non-starter.” Sound familiar? This kind of reasoning is often the driver behind either…

The Week In Tech: Boom For Facebook & Bust For Apple

The Week In Tech: Boom For Facebook & Bust For Apple

The Week In Tech Headlines the world over seem to confirm one thing: the seemingly endless party is coming to an end for Apple. They’ve had an extremely difficult week starting with the unfortunate onsite discovery of a deceased Apple employee, to the first time in 13 years that the Cupertino-based company was forced to…

The Aides and Obstacles of Cloud Computing

The Aides and Obstacles of Cloud Computing

Reporting From The Cloud Recent reports pointing to steadily increasing revenues of 21 benchmarked Internet of Things (IoT) companies suggest that cloud computing and IT infrastructure are particularly influential to these positive returns. Says Dan Callahan, TBR analyst specializing in IoT, “Effectively, every type of IT and operational technology (OT) vendor will have a stake…

Living In The Industrial $15 Trillion IoT Market

Living In The Industrial $15 Trillion IoT Market

$15 Trillion IoT Market The industrial revolution of more than two centuries ago is viewed today as a major turning point in civilization wherein a predominantly agrarian and rural landscape became urbanized and industrial. Though we might imagine these changes would have been rousing and remarkable to those experiencing them, the 60 to 80 year…

Two Factor Authentication and the Password Game

Two Factor Authentication and the Password Game

Two Factor Authentication Over the past number of weeks, Two-Factor Authentication (2FA) has repeatedly been in news. Firstly, there was news that Android’s two-factor authentication can be compromised easily and then there was news that Kickass Torrents has introduced 2FA security measure to their website. And in this post, we will be discussing why it’s…

How Will The Internet of Things Affect The Business World?

How Will The Internet of Things Affect The Business World?

Internet of Things and the Business World? Experts predict that by 2020, the Internet of Things will have a market greater than $1 Trillion, yet despite it being the new buzzword, many people have no idea how this predicted revolution will shape the business world. We’ve all heard predictions of various appliances with sensors, wearable…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

Cloud Security Firm ‘Threat Stack’ Secures $15.3 Million

Cloud Security Firm ‘Threat Stack’ Secures $15.3 Million

Threat Stack Secures $15.3 Million Scale Venture Partners Leads Round; Market Demand and Rapid Customer Growth Key to Series B Funding Round BOSTON – April 19, 2016 – Threat Stack, a leader in cloud security and compliance management, today announced it secured $15.3 million in Series B funding, led by Scale Venture Partners (Scale), with…

Resurrecting CHAOS (Controlling Havoc and Overhauling Security) for Today’s CIOs

Resurrecting CHAOS (Controlling Havoc and Overhauling Security) for Today’s CIOs

Resurrecting CHAOS for Today’s CIOs and CISOs While at CloudExpo, London last week I had the chance to chat to RedHat’s Richard Morell. He suggested that I resurrect CHAOS (Controlling Havoc and Overhauling Security) Theory from a couple of years ago as the message is still holds very true. The term ‘chaos theory’ first came…