Category Archives: Technology

Resolved: Username/Passwords Alone MUST Go

Resolved: Username/Passwords Alone MUST Go

Username/Passwords MUST Go New Year’s Resolution #1 for any cloud IT deployment manager in 2015 ought to be that the user name/password alone must go.  High-profile breaches that exploit username and password-only authorization systems are becoming all-too-frequent events.   The Syrian Electronic Army’s attack on the Associated Press’s Twitter account that caused a 136 Billion dip…

How Much Data Do You Need To Hide?

How Much Data Do You Need To Hide?

How Much Data Do You Need To Hide? “If you’ve not got anything to hide, you’ve not got anything to worry about”, or so the old saying goes… But how true is that phrase in the modern age? Do you have anything to hide, no matter how small? Are you happy for ISPs, governments and…

Developers, the Cloud and Security Concerns

Developers, the Cloud and Security Concerns

Thought Provoking Survey So I got to thinking about security and how this relates to developers in particular. This was prompted by a recent read of the findings reported in a survey, “2014: The Year of Encryption” conducted by Egress Software Technologies, of delegates at Europe’s largest information security event Infosecurity Europe 2014. And you…

IoT – Garage Sale Cyborgs

IoT – Garage Sale Cyborgs

IoT – Garage Sale Cyborgs The Internet of Things, or IoT, is a big hit these days. However, IoT has a few problems that need to be addressed. One of those issues is how there are many devices that all do one specific thing. So if you want to exercise, you need a specific device…

Big Data and Geographical Analytics

Big Data and Geographical Analytics

Big Data and Geographical Analytics Not long ago we wrote how geotagged tweets are used for mapping trends like race opinions and for charting real-time events like the 2012 Kentucky earthquake. A similarly themed set of articles was published at Quartz recently, showcasing the use of location-enabled tweets for the noble goal of mapping nationwide…

Cloud Security In The Workplace

Cloud Security In The Workplace

Workplace Cloud Security Our workplaces are changing and much of it for the better. Increased flexibility – pushed by cloud services – is behind many of the changes. Home working, increased collaboration – it’s all good, and it’s all delivering significant business benefits. We know that. That’s so 2013. But fewer than 10% of businesses…

Cloud Ready Business Drivers

Cloud Ready Business Drivers

Cloud Ready Business Drivers Many organizations are faced with the dilemma of moving to the cloud. Understandably so. This isn’t a decision that can be taken overnight. Every CTO and CIO will do their due diligence of mapping business and technology needs before they make their final call. There are a few business scenarios though…

A Look Into The Crystal Ball: Predictions For 2015

A Look Into The Crystal Ball: Predictions For 2015

Predictions For 2015 At the start of a new year we have the opportunity to look ahead and think about what trends will likely shape the coming months. 2015 is poised to be transformative for government agencies and enterprises, as an increasing number of organizations look to modernize their computing environments, expand their focus on…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising