Category Archives: Security

Leveraging Cloud Computing Through Automation

Leveraging Cloud Computing Through Automation

If you can define it, you can have it It’s true. The full potential of automation cannot be fully realized until it is informed and supported by an effective IT service management strategy (ITSM) that encompasses your entire IT environment, as well as business objectives, and corporate policy. Technology and business really can function as…

Cloud Infographic: Top Mobile Malware Trends

Cloud Infographic: Top Mobile Malware Trends

Cloud Infographic: Top Mobile Malware Trends “Any sufficiently advanced technology is indistinguishable from magic.” – Arthur C. Clarke In the modern high technology world, we observe mobile malware spreading with such rapid advances. The inforgraphic provided below by NQ.com will help you get the general overview of infection strains and rates with regard to mobile threats.…

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality

Should The Cloud Be To Blame Or The App Invasion? – Part 2: The Reality In part one of our mini two part series, published yesterday, we looked at some of the fallout from the recent celebrity photograph scandal. We looked at Apple’s response, deducing that they correctly believed that users were more responsible than…

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

Cyber Forensics Research Study: Possible 968 Million Android Users Affected

Cyber Forensics Research Study: Possible 968 Million Android Users Affected A recent study has been released by the Cyber Forensics Research and Education Group (cFREG) at the University of New Haven, which found that there are serious security and privacy problems in the Android platform. 968 million Android users may be at risk due to…

On A Clear Day: Downtime In Cloud Computing

On A Clear Day: Downtime In Cloud Computing

On A Clear Day: Downtime In Cloud Computing As most know, and as the recent Azure outage kindly reminded those who don’t, cloud storage isn’t infallible. Power outages happen all the time. Software is prone to catching nasty bugs. Human error can never be ruled out. Service providers openly acknowledge the possibility of failure. Some, like…

Cloud Infographic: Data Protection For The Edge

Cloud Infographic: Data Protection For The Edge

Cloud Infographic: Data Protection For The Edge With the ever increasing role of big data in our lives, protecting data must be a top priority for IT leaders, marketers and executives across enterprises, but the research shows that an increasing number of employees are actually failing to do so, exposing their mission-critical data to significant…

vArmour Raises $36 Million To Protect The Data Defined Perimeter

vArmour Raises $36 Million To Protect The Data Defined Perimeter

Menlo Ventures, Columbus Nova Technology Partners and Citi Ventures Contribute Funds to Accelerate Development of Disruptive Technology, Scale to Meet Global Demand MOUNTAIN VIEW, CA–(Source: Marketwired – Aug 20, 2014) – vArmour, a stealth security company designed to protect the new data defined perimeter for enterprises, today announced it has raised $36 million in funding,…

Contributors

Featured Writers

Self-Service BI (Business Intelligence) 101

Self-Service BI (Business Intelligence) 101

BI (Business Intelligence) 101 Non-technical users are increasingly jumping at the opportunity to get real-time business insight from data without the help of the IT department, whether they’re a small business without an IT staff altogether, or a high-ranking executive unwilling to request a report that will take a week to be completed. What is…

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges (5 Things To Expect)

2015 Cybersecurity Challenges Every December, security experts begin to release their predictions on what cybersecurity will look like in the coming year. “The concept behind predictions is based on a company’s ability to express its expertise in a field both on the business and on the technology end,” said Barry Shteiman, director of security strategy…

The Role Cloud Technology Plays in the Recruiting Industry

The Role Cloud Technology Plays in the Recruiting Industry

The Recruiting Industry Like most other established industries, the recruiting industry is being disrupted by new business models and cutting-edge technologies. From recruiting technology talent with a highly publicized hackathon, to handling graphic or even online versions or resumes, recruiting agencies are seeing new challenges and opportunities every day. Yet, the goal is still the…

Cloud and regulation in financial services

Cloud and regulation in financial services

Cloud Regulation When talking about cloud and regulation in financial services, it is important to approach it with a clear understanding of the typical policies that your national regulator will require you to adhere to. Let’s start with outsourcing policy. Cloud mode provides us with a way of outsourcing data centre environments, applications, and services…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

You can help continue to support our community by social sharing, sponsoring, partnering or contributing to this great educational resource.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter