Symantec Acquisition of Boeing’s Cybersecurity Unit

Symantec Acquisition of Boeing’s Cybersecurity Unit

Symantec Acquisition Recently, Symantec Corp. announced the takeover of Narus, Boeing’s cyber security unit. The aeronautical company will retain Narus’ intellectual property and licenses, which will be transferred to Symantec. The terms of the deal announced on January 12 were not fully disclosed. However, our sources have a price estimate of $24.59 per stock for…

Who Wears The Wearables?

Who Wears The Wearables?

The Wearables A rather curiously titled piece, “Fitness Trackers Only Help Rich People Get Thinner”, was published this Monday on the The Atlantic website. The benefits of fitness trackers, the author argues, are bound to be reaped by a select demographic–people younger than 35 (representing about half of the users) and earning more than $100,000…

Cloud Computing Price War, Only The Beginning

Cloud Computing Price War, Only The Beginning

Price War On Cloud Computing The Cloud computing providers’ price war is on. In recent years, providers have been slashing prices in order to generate more clients. A phenomenon called “Race to Zero”, Services like Amazon Web Services (AWS) has cut its prices 44 times in the last six years, while providers like Microsoft and…

Skin Based Technology – The Intelligent Tattoo

Skin Based Technology – The Intelligent Tattoo

The Intelligent Tattoo I’ve got you under my skin: the rise of the intelligent tattoo As the Internet of Everything expands its reach to embrace many new areas of life, the race continues to develop more robust and accessible tools. Wearables are being whittled down from clunky watches to smart clothes and wrist bands, but…

Can Google Detect Cancer?

Can Google Detect Cancer?

Can Google Detect Cancer? Google X – the tech giant’s semi-secret facility that is dedicated to making major technological advancements – is well-known for its ‘moonshots’; ideas which seem outlandish but which have often produced some of the most exciting, forward-thinking, and widely used technology that’s available today. Success stories include Google Translate, self-driving cars,…

Resolved: Username/Passwords Alone MUST Go

Resolved: Username/Passwords Alone MUST Go

Username/Passwords MUST Go New Year’s Resolution #1 for any cloud IT deployment manager in 2015 ought to be that the user name/password alone must go.  High-profile breaches that exploit username and password-only authorization systems are becoming all-too-frequent events.   The Syrian Electronic Army’s attack on the Associated Press’s Twitter account that caused a 136 Billion dip…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Internet of Things
Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears

5 Ways CIOs Can Tackle Cloud Fears  CIOs are tired of hearing about cloud computing concerns. They’ve spent years reading about how cloud resources are subject to risks, and wonder – what can they do to help people trust the cloud?  The truth is that despite being a hot issue for years, the topic of…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys To Effectively Make Public Cloud Applications Private

Blue Coat Acquires Perspecsys Expands portfolio in exploding cloud security market, providing relief for multinational enterprises struggling with data compliance requirements & regional sovereignty regulations SUNNYVALE, Calif., July 30, 2015 – Blue Coat Systems, Inc., a market leader in enterprise security, today announced it has acquired Perspecsys, Inc., a leader in enterprise cloud data protection…

Global Leaders In Malware And Malicious C2 Traffic

Global Leaders In Malware And Malicious C2 Traffic

Malware and Malicious C2 Traffic Nearly half of all malware threats in the past three months originated in the US, while both the US and China are global leaders when it comes to malicious command and control (C2) traffic. This was revealed in the latest quarterly report from NTT Group security company Solutionary released this…

Domain Shadowing – Wild West Of Internet Cyber Attacks

Domain Shadowing – Wild West Of Internet Cyber Attacks

World Wide Web Labeled Wild Wild West of Internet Cyber Attacks A new “threat report” labels the World Wide Web (www) the Wild Wild West of cyber warfare stating that the Internet is still “an untamed frontier.” The report from Bromium Labs, security analysts, that study key trends in the cyber attack landscape and specialize…

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment – International Competition Mounting

Alibaba $1 Billion Dollar Cloud Investment  China’s Alibaba Group Holding Ltd (BABA.N) said on Wednesday it would invest $1 billion into its Aliyun cloud computing arm to challenge Amazon.com Inc’s (AMZN.O) lucrative Web Services division, opening a global front in the battle between the two e-commerce giants. With the global cloud computing market estimated by…

SPONSOR PARTNERS

kpmg network salesforce-logo site24x7

CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising