Tag Archives: data breaches

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach – Lessons Learned

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and…

5 Cloud Security Predictions For 2014

5 Cloud Security Predictions For 2014

5 Cloud Security Predictions For 2014 Data security is always a hot topic among IT industry pundits, but I believe 2013 will go down as the year security crawled out of the basement and into the cultural zeitgeist. Edward Snowden and the NSA spying revelations may have been the biggest tech story of the year.…

Understanding Twitter’s Security Enhancements

Understanding Twitter’s Security Enhancements

Understanding Twitter’s Security Enhancements Last week Twitter announced a significant security enhancement – enablement of forward secrecy on twitter.com, api.twitter.com, and mobile.twitter.com domains. The prime objective of this change is to deprive hackers of an important exploitation tool. Why was this necessary? In the past 18 months, Twitter, akin to many other social network companies,…

5 Reasons Why The Cloud Is Still Not 100% Secure

5 Reasons Why The Cloud Is Still Not 100% Secure

5 Reasons Why The Cloud Is Still Not 100% Secure In the last year, many big cloud companies have come under cyber attacks leading to outages and data losses Cloud companies offer tremendous trade-offs to businesses in terms of flexibility of scale, better security, reduced manpower and maintenance cost. The majority of organizations and individuals…

Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy

Symantec Report Keeps Cloud Users Security-Savvy Users of cloud services can easily fall foul of complacency.  With all personal data held on cloud servers, there is a strong temptation to worry less about threats to our device.  But for as long as we use devices for authentication and access to our cloud accounts, a threat…

Better Data Risk Mitigation For SaaS Providers

Better Data Risk Mitigation For SaaS Providers

Better Data Risk Mitigation for SaaS Providers We live in a world that is rife with internal-controls breakdowns that result in security and data breaches, which can cause tremendous business and reputational damage for organizations. The rise of cloud computing systems has now created an even greater need for organizations to develop the right controls…

SaaS For Startups: 6 Things Every CEO Should Know

SaaS For Startups: 6 Things Every CEO Should Know

SaaS For Startups: 6 Things Every CEO Should Know SaaS packages have evolved from large enterprise commodities to must-have solutions for businesses of all sizes. Once reserved for large corporate infrastructures, the evolution in cloud technology and the BYOD trends have changed how businesses use and license out SaaS platforms. That being said, with all of the…

Popular

Top Viral Impact

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

Cloud Infographic – Cyber Security And The New Frontier

Cloud Infographic – Cyber Security And The New Frontier

Cyber Security: The New Frontier The security environment of the 21st century is constantly evolving, and it’s difficult to predict where the next threats and dangers will come from. But one thing is clear: the ever-expanding frontier of digital space will continue to present firms and governments with security challenges. From politically-motivated Denial-of-Service attacks to…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Whitepapers

Top Research Assets

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too With security threats to information services growing in sophistication, frequency and variety, IT professionals on all sides of the marketplace are realizing an urgent need to reinvent themselves to better anticipate the bewildering variety of attacks that they and their customers face. The…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Advertising Package Options 2015 We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more…

Contributors

What Should SMEs Do To Prevent Common Mistakes?

What Should SMEs Do To Prevent Common Mistakes?

Spending And Planning Wisely Overview – Billions of pounds from valuable IT and communication (ICT) budgets are wasted each year due to common mistakes in the market. These are some of the pitfalls you should avoid. With small businesses (especially start-ups with online ambitions) relying more and more on their understanding and utilisation of ICT, it’s…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to…

CloudBuzz

Popular News Sources

Get ready for IoT, mobile cybercrime in 2015: industry

Get ready for IoT, mobile cybercrime in 2015: industry

The Internet of Things (IoT) and smartphones will continue to be under attack in 2015 as cyber criminals find ways to exploit more devices, according to cyber security experts. Read the source article at Computerworld Australia

Cloud computing and grid computing are not the same

Cloud computing and grid computing are not the same

While cloud computing and grid computing are both concepts that involve large-scale computer networks, they are certainly not the same thing. Cloud computing refers to an architecture in which large groups of remote servers are networked to allow centralized data storage and online access to computer services or resources. Of course, there are several cloud technology delivery…