Cyber Security Is BIG Business

Cyber Security Is BIG Business

Cyber Security Investments Are Growing Cyber Security shares on Wall Street are soaring as hackers continue to crack into the cyber defense systems set up by government agencies, banks and retailers. Ongoing high-profile breaches have led to larger-than-life share increases of numerous US companies, as well as the exponential growth of a “passive investment” fund…

7 Cloud Security Mistakes Bound To Bite You

7 Cloud Security Mistakes Bound To Bite You

7 Main Cloud Security Mistakes  Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise’s data apply. Cloud computing is to IT what Shark Week is to summertime: a cultural feeding frenzy.…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

What Don’t You Know About Your Cloud?

What Don’t You Know About Your Cloud?

Looking Under The Hood Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels like you barely know them at all. You’re right In many ways it’s…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

Heroes Of The Cloud – Part 3

Heroes Of The Cloud – Part 3

Heroes Of The Cloud – Part 3 Lew Tucker Cisco Systems was one of the companies which rode the wave of success popularly known as the “Dot Com Boom” of the late Nineties. Unlike many of the tech companies that fell to ruin when the Dot Com Bubble burst, Cisco has managed to remain relevant…

Cloud-Computing Tools For Doctors And Physicians

Cloud-Computing Tools For Doctors And Physicians As we discussed in an older article, cloud computing technologies are on the rise in the healthcare industry. From large hospitals to physicians and administrators to small medical services providers, all have seen cost savings from implementing and utilizing cloud-based solutions. Today we will focus more on small medical…

Heroes Of The Cloud – Part 2

Heroes Of The Cloud – Part 2

Heroes Of The Cloud – Part 2 Cloudscaling As Cloud Computing becomes more prominent and influential, a few voices rise to the top to define what it means to operate in a Cloud environment. One of the most respected and influential of these voices is Cloudscaling co-founder and CTO, Randy Bias. Bias is a recognized…

Cloud Computing And Banking Security

Cloud Computing and Banking Security I have talked about security in cloud computing many times before, explaining why it is just as safe as conventional networking security, even citing its benefits over the conventional. However, there are many who still find cloud computing security lacking. Individuals which still worry about cloud security, are those that…

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Is Docker The Next Big Thing?

Is Docker The Next Big Thing?

Is Docker The Next Big Thing? We often hear that a particular product or idea is going to be the ‘next big thing’, and analysts and commentators are frequently falling over themselves to predict an emerging trend or developing idea. In the case of Docker, it might actually be justified. The open source technology is…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Announces Intent to Acquire OpenDNS Acquisition to Accelerate Cisco’s Cloud Delivered Security Portfolio SAN JOSE, Calif. – June 30, 2015 – Today, Cisco announced its intent to acquire OpenDNS, a privately held security company based in San Francisco. OpenDNS provides advanced threat protection for any device, anywhere, anytime. The acquisition will boost Cisco’s Security…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7


Contributor Spotlight

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising