Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

IBM Makes Major Moves This Week

IBM Makes Major Moves This Week

Major Cloud Announcements Is it possible to reach out and define your part in the cloud? IBM is doing just that. IBM has partnered with Vmware and others to mark out its lead in the cloud territory. Hosting its own InterConnect event in Las Vegas, IBM unveiled several large partnerships with Apple, Vmware, GitHub, Bitly, and…

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

New Levels of Mass-surveillance? There’s a dark cloud hanging over the cloud. Recently, US security chief James Clapper blithely revealed that the government “could” use the Internet of Things for civilian surveillance. Given the heightened alarm caused by domestic terrorism, I take it the word ‘will’ is more applicable than ‘could’ in this case. If…

The Lurking Threat Called Passivity

The Lurking Threat Called Passivity

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around the world using Internet connections to break in and wreak havoc. But surprisingly, a significant…

How To Use Big Data And Analytics To Help Consumers

How To Use Big Data And Analytics To Help Consumers

Big Data Analytics Businesses are under increasing pressure to develop data-driven solutions. The competitive advantage gained by a successful strategy can be immense. It can create new opportunities and help businesses to react to different scenarios or sudden changes in the market. But innovation and resilience are not easily achieved, and organizations always face difficult…

Automation – Are We At Risk?

Automation – Are We At Risk?

Future Automation  The automation of society is happening. Those who have read Kurt Vonnegut’s Player Piano know that it depicts a dystopia in which the economic system has made material abundance plentiful, but deprives the masses of meaningful labor. He shows us a future where all work is menial and unsatisfying, and where only a…

CloudTweaks Comics
It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud Earlier in the month I talked about Bouillabaisse a fish stew or as I called it Cloud Bouillabaisse both are heavily reliant on what you put in it. Building on that food theme (I have to stop writing these blogs at dinner time…) I would like to talk about cloud…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

The Meaning Of Secure Business Agility In The Cloud

The Meaning Of Secure Business Agility In The Cloud

Secure Business Agility In The Cloud As cloud continues to accelerate business delivery and shift away the balance of power from IT and InfoSec to business users, organizations need to find ways to ensure that security is part of a business process rather than an afterthought. Today’s organizations are transacting some of their most valuable…

5 Things A Cloud Provider Should Offer – Part II

5 Things A Cloud Provider Should Offer – Part II

5 Things A Cloud Provider Should Offer Part II I recently posted an article for the CloudTweaks community on “Cloud-Enabled Managed Hosting: 5 Things a Cloud Provider Should Offer” and many readers have since asked me to expand upon this list. So, as a sequel to my first article, here are another five things I…

Automation of Access Management Means a Happier IT Staff

Automation of Access Management Means a Happier IT Staff

Automation of Access Management One of tasks that your IT department probably really dislikes is managing the in-house and cloud user accounts and passwords for all of the employees in the company. Though this is usually an easy task, it is extremely mundane and time consuming, especially for a company that has frequent movement of…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor