7 Cloud Security Mistakes Bound To Bite You

7 Cloud Security Mistakes Bound To Bite You

7 Main Cloud Security Mistakes  Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise’s data apply. Cloud computing is to IT what Shark Week is to summertime: a cultural feeding frenzy.…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

What Don’t You Know About Your Cloud?

What Don’t You Know About Your Cloud?

Looking Under The Hood Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels like you barely know them at all. You’re right In many ways it’s…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

Venture Capitalists’ Growing Interest In The Internet Of Things

Venture Capitalists’ Growing Interest In The Internet Of Things

Venture Capitalists’ Growing Interest In The Internet Of Things Investors, even venture capitalists, can be a cautious bunch. While they may have a reputation for throwing money at a sector or industry just to see what sticks, the reality of their approach couldn’t be further from the truth. As we reported back in August last…

See Spot Run: Robot Dog Will Blow Your Mind

See Spot Run: Robot Dog Will Blow Your Mind

Robot Dog Will Blow Your Mind Hey Spot, want to go for a driverless car ride? As if Google’s takeover of almost everything tech wasn’t enough, now they appear to be the leading innovation in the development of wild animal-like bots. Spot is arguably the most impressive robot dog to date. Unlike most of its…

Is Wearable Technology and The IoT The Future of Love and Sex?

Is Wearable Technology and The IoT The Future of Love and Sex?

Technology – The Future of Love and Sex? Technology now touches almost every corner of our lives, but while most of those corners have been improved by advances in devices and computing power, a recent survey by Durex claimed that 33 percent of people felt that their intimate relationships were being negatively impacted by technology.…

Is Data Protection Holding Back European Businesses

Is Data Protection Holding Back European Businesses

Is Data Protection Holding Back European Businesses from Adopting the Cloud? Why are companies within the European Union yet to warm to the Cloud? Businesses within the EU are not adopting cloud-based systems as quickly as expected. Do data protection laws and restrictions play a role in Europe’s slow uptake? Despite the fact that cloud…

Samsung Smart TV – Who Is Watching Who?

Samsung Smart TV – Who Is Watching Who?

Samsung Smart TV Smart TV voice recognition software could transmit ‘personal or other sensitive information’ to a third party, Samsung’s policy warns Users of Samsung’s Smart TV devices have raised concerns over the device’s privacy policy, which seems to suggest that they should not discuss any sensitive topics in their living room while the television…

Hackers And New Automobiles

Hackers And New Automobiles

Hackers And New Automobiles Automakers are cramming cars with wireless technology, but they have failed to adequately protect those features against the real possibility that hackers could take control of vehicles or steal personal data, according to an analysis of information that manufacturers provided to a senator. “Drivers have come to rely on these new…

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker Docker started as just a software container on top of a Linux operating system which seemed like a simple optimization for a fat hypervisor. Its disruptive force however comes from the fact that it does force us to rethink many of the layers of the cloud stack. Starting from the way we…

How The Cloud Is Changing Disaster Recovery

How The Cloud Is Changing Disaster Recovery

How the Cloud is Changing Disaster Recovery Anyone who is a regular reader of this site will know about the cloud’s numerous benefits. Using the cloud can provide businesses with cost-effective resource usage, rapid provisioning, easy scalability and flexible elasticity – benefits that simply don’t exist when using local on-site servers and services. One of…

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Bridging The Chasm Between Business And IT – The GRC Way

Bridging The Chasm Between Business And IT – The GRC Way

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations, like the deployment and management of IT infrastructure, applications and services are driven by the…

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

Cisco Announces Intent to Acquire OpenDNS Acquisition to Accelerate Cisco’s Cloud Delivered Security Portfolio SAN JOSE, Calif. – June 30, 2015 – Today, Cisco announced its intent to acquire OpenDNS, a privately held security company based in San Francisco. OpenDNS provides advanced threat protection for any device, anywhere, anytime. The acquisition will boost Cisco’s Security…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7


Contributor Spotlight

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising