Category Archives: Storage

Insider Threats To Cloud Computing

Insider Threats To Cloud Computing Cloud computing uptake by businesses has shifted the general model of organizational information complexes. Business enterprises have a lot of data to store and use. Even as they shift to the cloud, there are major dangers around security. In most cases, breaches to cloud-stored files happen because of insider conspiracy,…

Why IaaS Is The Easiest Phase Of Data Security In Cloud Computing

Why IaaS Is The Easiest Phase Of Data Security In Cloud Computing The cloud is expanding everyday and no longer looks like the shapeless puffy fleece that was until recently. The post-millennium years have seen cloud computing tighten to the bursting point since many entrepreneurs have been trying to rent space on their own. There…

Air Traffic Management Set To Meet Cloud Technology

Air Traffic Management Set To Meet Cloud Technology After revolutionizing domains like industrial design and engineering simulation, cloud computing is now set to drastically modify air traffic management technology. In a recent proceeding, General Electric Company and National Aeronautics and Space Administration (that’s NASA) have teamed up to undertake a project aimed at incorporating cloud…

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud

Cloud Infographic: The Rise Of The Cloud Findings from a joint Cloud Security Alliance (CSA) and ISACA survey show that government regulations, exit strategies and international data privacy dominate the Top 10 areas where confidence in the cloud is lowest. A collaborative project by ISACA and CSA, the Cloud Market Maturity study  provides business and…

Cloud Computing: The Next Step Towards the Future

Cloud Computing: The Next Step Towards the Future Cloud computing can be described as computer resources delivered as a service through a network. Although cloud computing has gained popularity recently, its origin can be dated as far back as the early ‘90s. Some may even argue that its conceptual origins date back to the ‘60s,…

Contributors

Featured Writers

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM

The Business Benefits of Cloud CRM From software deployment, to mobility, to wearable technology, cloud computing has transformed seemingly every aspect of modern business. Research indicates cloud applications and platforms will be at the forefront of IT spending by 2016, with half of all enterprises implementing cloud solutions by 2017. One of the quickest markets…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Contact

CloudTweaks Media
Phone: 1 (212) 763-0021

Join Our Newsletter