Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

7 Cloud Security Mistakes Bound To Bite You

7 Cloud Security Mistakes Bound To Bite You

7 Main Cloud Security Mistakes  Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise’s data apply. Cloud computing is to IT what Shark Week is to summertime: a cultural feeding frenzy.…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

What Don’t You Know About Your Cloud?

What Don’t You Know About Your Cloud?

Looking Under The Hood Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels like you barely know them at all. You’re right In many ways it’s…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

Zero Distance: Getting Closer To The Customer

Zero Distance: Getting Closer To The Customer

Zero Distance: Getting Closer to the Customer With Cloud technology becoming more and more central and critical to the day-to-day operations of business, the need for clear guidance and understanding, both in technical terminology and customer service strategy is becoming greater than ever. Decision-makers are no longer allowed the time to review and digest new…

Cloud Capabilities: Xbox One

Cloud Capabilities: Xbox One

Cloud capabilities:  Xbox One Azure Azure cloud service will be available at Xbox One’s launch. Microsoft says that their new gaming console can offload some computations to the cloud in order to increase local power of the console. Xbox One games could be streamed live and shared via the cloud. Similar to its rival Sony,…

What’s All The Software Defined Fuss About? Busting Myths From VMworld

What’s All The Software Defined Fuss About? Busting Myths From VMworld

Talking with people at VMworld in San Francisco and Barcelona, it was clear that software-defined networking (SDN) and software-defined data centers (SDDC) were a major area of focus for most businesses. These topics are vital to the evolution of virtualization and cloud infrastructure but media hype is already starting to distort the realities they present…

Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud Ransomware is a kind of malware that withholds some digital assets (mostly user’s data) from its victims and asks for payment for their release. Ransomware could be the best reason yet to use cloud data storage systems. Over the past several weeks, many Windows users were infected by CryptoLocker…

Where Does The Buck Stop In The Cloud?

Where Does The Buck Stop In The Cloud?

Where Does The Buck Stop In The Cloud? Who is responsible for outages caused by IaaS failures. Is the relationship between traditional data centers and customers better for small and medium businesses? Consider these two scenarios. One You are hosting your busy website on a cluster of managed dedicated servers located in a trusted data center.…

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses

Cloud Startup – Adallom, Bringing Security Exclusively To SaaS Businesses Startup Adallom Goes Public After 18 Months Of Private Beta  Tal Klein, VP of marketing for the newest security specialist startup, Adallom, says that after eighteen months of beta testing, clients have urged Adallom to go public; so, public they are going. As of this Tuesday the…

The History Of Back-Ups

The History Of Back-Ups

The History of Back-Ups There’s no doubt about it – we are spoilt. With external hard-drives, CDs, USB memory sticks, SD cards, online storage and multiple devices with vast memories we can save, access and back up our data more easily and more efficiently than ever before. (Image Source: Maxim Yurin, SoftLogica)  It’s not always been…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

The Cloud In 2015: Eight Trends To Look For

The Cloud In 2015: Eight Trends To Look For

The Cloud In 2015 For organizations of all sizes, in 2014 the cloud emerged as a critical part of the default consideration set when implementing any new application – in large part due to the cloud’s proven ability to handle data storage and processing demands in an elastic manner, improved verifiable standards around data security and…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Announces Intent to Acquire OpenDNS Acquisition to Accelerate Cisco’s Cloud Delivered Security Portfolio SAN JOSE, Calif. – June 30, 2015 – Today, Cisco announced its intent to acquire OpenDNS, a privately held security company based in San Francisco. OpenDNS provides advanced threat protection for any device, anywhere, anytime. The acquisition will boost Cisco’s Security…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7


Contributor Spotlight

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising