Cyber Security Is BIG Business

Cyber Security Is BIG Business

Cyber Security Investments Are Growing Cyber Security shares on Wall Street are soaring as hackers continue to crack into the cyber defense systems set up by government agencies, banks and retailers. Ongoing high-profile breaches have led to larger-than-life share increases of numerous US companies, as well as the exponential growth of a “passive investment” fund…

Africa: Cloud Computing’s Secret Weapon

Africa: Cloud Computing’s Secret Weapon Cloud computing’s best opportunity for unparalleled progress and worldwide relevance lies in how deeply and effectively it penetrates the African information technology community. Point blank. Why is this so? Simply because the massive continent remains in the dark ages of technology of all sorts, a condition which has fostered as…

Cloud Computing Startups Raise Big Money: UPDATE 13

Cloud Computing Startups Raise Big Money: UPDATE 13 This is the fourteenth in a continuing series on startups raising funding. You can read the latest in the series at: Cloud Computing Startups Raise Big Money: UPDATE 12 . For previous updates, please click on relevant links in the aforementioned article.  Today, there are two startups in focus – Sonian…

Why Is Europe Not Storming The Cloud?

Why Is Europe Not Storming The Cloud? It is expected that Europe will be behind the US by a minimum of two years when it comes to cloud computing adoption, due to four major issues: the current euro crisis, advanced privacy rules, the changing political decision-making, and local business needs. These are the primary reasons…

Can The Gov’t Avoid Gaffes In The Cloud?

Can the Gov’t Avoid Gaffes in the Cloud? It’s no surprise that programs that shape our government on all levels of jurisdiction are rapidly and eagerly enlisting into the cloud computing fray. Finally, several of cloud’s noteworthy assets — scalable and streamlined storage and infrastructure, and services purchasable a la carte, for example — have…

Top Threats For Cloud Computing

Top Threats For Cloud Computing Cloud computing reached the point where computing functions as a utility. Here are the top cloud computing threats to help organizations better understand them and make the best choices for their businesses. Threat no 1: Security threats With cloud computing managing critical enterprise data, are enterprises and individuals possible victims…

Apple Vs. Google: The Great Cloud War

Apple Vs. Google: The Great Cloud War You wouldn’t have expected it a few years ago, as Apple and Google were focusing on different sectors of the tech industry. In some cases, they actually created technologies that could benefit from each other. However, the two giants are just about ready to go toe-to-toe with each other nowadays.…

Business Agility Of Cloud Computing

Business Agility Of Cloud Computing

Business Agility of Cloud Computing Cloud computing is a fresh approach to IT operations. In companies with non-agile IT organizations there is misunderstanding between IT managers and stakeholders. IT finds that money and skill sets are the problems while stakeholders feel that there is a lack of infrastructure and technology to meet the ever increasing…

Taxing The Cloud: KMPG’s Take On Global Cloud Computing Taxation

Taxing The Cloud: KMPG’s Take On Global Cloud Computing Taxation A fresh resource, custom-tailored to help end users and service architects of cloud computing services along their journey of scheduling procedures, managing operational dynamics, planning work execution and other relevant parameters – all with the core intent of dealing with the associated tax exposure, has…

The Private Cloud Strikes Back

The Private Cloud Strikes Back Having read JP Rangaswami’s argument against private clouds (and the obvious promotion of his version of cloud) I have only to say that he’s looking for oranges in an apple tree.  His entire premise is based on the idea that enterprises are wholly concerned with cost and sharing risk when that can’t…

IoT

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

How Your Business Can Overcome Its Fear of BYOD

How Your Business Can Overcome Its Fear of BYOD

Overcoming BYOD Fear While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27…

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid “For what greater wealth can there be than cheerfulness, peace of mind, and freedom from anxiety?” So wrote the English author and philosopher Sir Thomas More in his novel, Utopia, almost 500 years ago. More’s utopian dreams continue to thrive in one guise or another to the present day; in the…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

The History Of Back-Ups

The History Of Back-Ups

The History of Back-Ups There’s no doubt about it – we are spoilt. With external hard-drives, CDs, USB memory sticks, SD cards, online storage and multiple devices with vast memories we can save, access and back up our data more easily and more efficiently than ever before. (Image Source: Maxim Yurin, SoftLogica)  It’s not always been…

Report: Cybercriminals Rely On People To Access Corporate Environments

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed 10 million users as well as 1 billion files and more than 91,000 applications and…

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms The National Security Agency (NSA) has announced that it plans to introduce methods of cryptology that will make quantum computers secure. Acknowledging that quantum computers are likely to become a reality in the not too distant future, they say they are committed to the transition and are doing everything…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising