New Approach Addresses Cybersecurity Challenges For The IoT

New Approach Addresses Cybersecurity Challenges For The IoT

Cybersecurity Challenges For The IoT The traditional approach to cybersecurity is to assume trust and then take steps to manage what isn’t trusted. But as the concept of an industrial Internet of Things (IIoT) gains momentum, one of the primary challenges facing businesses is safeguarding connections between information technology (IT) and operational technology (OT). With…

Cloud Mobile Device Management Company 'Numara' Expands Operations

Company sets up operations in Asia, with an office in Singapore, Atul Sinha to head the Asian Operations, Asia region website launched www.numarasoftware.asia APAC Head Office, Sydney, Australia December 21, 2011 – Numara® Software, a global leader in service management, endpoint lifecycle management and mobile device management solutions for IT professionals, announced the launch of…

Enabling the Cloud for the Home

Enabling the Cloud for the Home Anyone who has used a virtualized system or seen what the Cloud can do has wondered what it would be like to have your own personalized Home Cloud. Most of the time they would think about how cool it would be to get your latest files, media and stuff…

China and the Cloud: Revising Culture to Reap New Business

China and the Cloud: Revising Culture to Reap New Business “Access your information from anywhere.” This is one of the primary tenets of marketing for cloud computing — entice consumers with the freedom to work, or play, wherever they roam. Selling such expansiveness should hit a snag in a nation that underscores authoritarian control, like…

Featured White Paper: Think Your Anti-Virus Software Is Working? Think Again.

Featured White Paper: Think Your Anti-Virus Software Is Working? Think Again. Some vendors are touting cloud-based AV solutions that place the malware signature database in the cloud. But whether the bandwidth crunch is at your endpoints or in between you and the cloud, it’s a performance hit nonetheless. Download this Lumension white paper from Web…

Cloud Printing: Is it more than just a fad?

Cloud Printing: Is it more than just a fad? Initial Intentions Back before cloud printing actually had solutions up and running it was thought that cloud printing could be used just for the really important absolutely-must-be-printed documents. These cloud printers would be placed at convenient locations and connected to the Internet so that people could…

Intel and its Vision of the Cloud

Intel and its Vision of the Cloud Intel and India have both featured in previous articles. Now, both of them came together at the “Intel Cloud Summit 2011” in Mumbai which covered Intel Cloud Builder(s) Program of reference architectures (See: Exploring the Intel Cloud Builder Community – Opportunities and Challenges in Asia )and the Intel…

Setting Up Your Own Private Cloud With A QNAP NAS

Setting Up Your Own Private Cloud With A QNAP NAS Previously Network Accessed Storage (NAS) devices were considered the cheap second-rate citizen in the centralized storage front despite the fact that many such NAS devices now support VMware, virtualization and other virtualized applications. Recent developments may just change this perception as some NAS devices now…

The Cloud Awaits: Storage For The Growing Virtualized Infrastructure

The Cloud Awaits: Storage For The Growing Virtualized Infrastructure Growth is a good situation for organizations to experience, but growth is not easy and presents challenges. Today, virtual environments in many industries are growing, and organizations are increasingly deploying VMware virtualization to help consolidate IT, improve business flexibility, increase application availability, and reduce costs. After virtualizing test and development environments, and other applications, many organizations…

IoT

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

5 Reasons Why The U.S. Dominates The Digital World!

5 Reasons Why The U.S. Dominates The Digital World!

U.S. Dominates The Digital World! I have spent about half my working life in the US and the other half in Europe. During this time (25 years) it has been exciting to see digital trends over the years. There has never been a doubt that the US has been a dominant power in anything digital…

The Cloud on Your Terms – What to look for in an EFSS Provider

The Cloud on Your Terms – What to look for in an EFSS Provider

The Cloud on Your Terms Your company has a mandate to go to the cloud and now it’s time to decide which services to use to help your business grow. You might be wearing several hats or you might be a dedicated IT professional and the responsibility has now been handed to you. So what…

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing Revenue Numbers Imagine that your viewpoint is shared by 5% of people. You’d be in a fringe political party, perhaps, or share a fondness for some obscure sport or hobby. Or you’d be a proponent of Cloud Computing. Because the reality is that after many years of technical development, entrepreneurial freneticism, and big-company marketing,…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Report: Cybercriminals Rely On People To Access Corporate Environments

Report: Cybercriminals Rely On People To Access Corporate Environments

Cybercriminal Report Users are the weakest link when it comes to cybersecurity, with only 1 percent representing 75 percent of the security risk in a cloud environment, according to a new cloud cybersecurity report released yesterday. The CloudLock Cyberlab analyzed 10 million users as well as 1 billion files and more than 91,000 applications and…

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms To Protect National Security Systems

NSA Planning For Quantum Resistant Algorithms The National Security Agency (NSA) has announced that it plans to introduce methods of cryptology that will make quantum computers secure. Acknowledging that quantum computers are likely to become a reality in the not too distant future, they say they are committed to the transition and are doing everything…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising