Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts receiving Distributed Denial of Service (DDoS) attacks that are carefully timed to re-strike just as their systems start to repair themselves. The attacks are carried out by waves of botnet…

Cloud Startup: Swyvel – Brings Project Management To The Cloud

Cloud Startup: Swyvel – Brings Project Management To The Cloud

Swyvel – Brings Project Management To The Cloud For Enhanced Company Productivity Project management, regardless of how big or how small, obviously involves many factors; from team member management and tasks management to resource management and budgeting. Effective project management starts with clear communication; though clear communication can get lost in and amongst the multiple…

The Lighter Side Of The Cloud – Data Loss

The Lighter Side Of The Cloud – Data Loss

By David Fletcher All David Fletcher comic images on this site are owned by CloudTweaks.com. If you would like to reuse them on your social media network, please feel free to do so as long as there is a clearly defined link to the original comic source. If you would like to use them in a Newsletter,…

Online Powerhouses – Too Big to Sue?

Online Powerhouses – Too Big to Sue?

Online Powerhouses – Too Big to Sue? Internet privacy is not just under siege from the NSA. Google is fighting two huge class action suits based upon privacy violations. Facebook recently settled two privacy-based class action lawsuits. These lawsuits are colossal because Google and Facebook are two mammoth companies with enormous numbers of customers. One…

Promises, Promises: Has The ERP Promise Finally Become A Reality?

Promises, Promises: Has The ERP Promise Finally Become A Reality?

Promises, Promises: Has the ERP Promise Finally Become a Reality? “You made me promises, promises you knew you’d never keep. Promises, promises why do I believe?” Those of us fortunate, or unfortunate, enough to enjoy the 80’s may remember these lyrics.  The lyrics could have been about the state of ERP before Cloud ERP came…

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

12/12 Contributors

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data For Extra Protection

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look at the case of using file sharing applications such as Dropbox. If you are the…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Methodically Plan Your Cloud Design First

Methodically Plan Your Cloud Design First

Are You Sure You Are Ready For The Cloud: Design For the last few months, we have been discussing getting ready to go to the cloud. We have covered topics such as Financial and Business Security reasons. We have even discussed the type of knowledge you should obtain. This month, we are going to take…

Why A Company-Wide Cyber Security Course Needs To Be Your Next Investment

Why A Company-Wide Cyber Security Course Needs To Be Your Next Investment

Cyber Security Course Needs To Be Your Next Investment Companies are facing serious threats of ransomware, phishing, malware attacks and data breaches that usually cost them big losses running into millions of dollars. These cyber security threats also damage reputations and destroy brands. According to a recent study by SolarWinds, employees who are untrained in…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Real Madrid Turns To Microsoft For Tech Help

Real Madrid Turns To Microsoft For Tech Help

Real Madrid Connecting Big Data To The Cloud We’ve seen big data and cloud technology put to many different uses by different businesses, namely the financial sector, but the entertainment industry has wised up to the benefits of large data sets as too has the world of sports. Spanish soccer team Real Madrid, the world’s…

The Growth Of Rampant Digital Diseases

The Growth Of Rampant Digital Diseases

Rampant Digital Diseases Keeping ‘Rombertik’ at Bay – The New Malware that Destroys Hard-Drives A new form of malware is still on the loose, and this one takes malicious to a whole new level. Nicknamed ‘Rombertik’ by Cisco Systems, the malware attempts to infiltrate the victim’s browser to procure confidential information; fairly standard operating procedure…

Cloud Infographic – Top Vulnerable Applications

Cloud Infographic – Top Vulnerable Applications

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks are more widespread than you can imagine and they may be targeting your devices as…

New Trends In Cloud Based Education

New Trends In Cloud Based Education

Cloud Based Education With technological progress accelerating and users’ computer experience becoming richer and increasingly complex, the future developments in education technology is very exciting. Students are now able to attend demonstration sessions on how to handle technology through remote laboratories using advanced applications in a truly interactive environment. One of these exciting areas is in telemedicine.…

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising