Tag Archives: Information security

(Smart) Phone Your Way To Success

(Smart) Phone Your Way To Success Today, I am going to talk about that one thing we use most in our lives – our smartphones. Recently, I came across an article that mentioned that of all the cell phones purchased in the US, 40% are smartphones. That got me thinking about these incredible devices’ increasing…

Virtualization Enables BYOD & Delivers IT

Virtualization Enables BYOD & Delivers IT

Virtualization Enables BYOD & Delivers IT Services On-Demand to Any Device With BYOD finding its way into the enterprise, the demand to deliver IT services to a plethora of devices while ensuring information security and keeping a centralized security policy are some of the real challenges which organization can no more ignore. Virtualization is an…

Making Cloud Adoption In China A Reality (In Spite of Data Privacy and State “Secret” Laws)

Making Cloud Adoption in China a Reality (In Spite of Data Privacy and State “Secret” Laws) Cloud computing has become a hot growth area in China, driven by both large-scale government initiatives and private investment. However, as alluring as the cloud is in China, for foreign firms trying to do business there, the uncertain legal…

Which Governance Framework Is Right For Cloud Computing?

Which Governance Framework Is Right For Cloud Computing? The Threat Cloud computing is revolutionizing how organizations use technology worldwide and for a good reason, it leverages on economies of scale more than any application of technology in recent history. And with the economic stability of the world swaying back and forth, organizations and businesses are…

The Impact Of Google’s ISO 27001 On Business

The Impact Of Google’s ISO 27001 On Business Google has recently acquired an ISO 27001 security certification. This certification is provided by an independent body to companies that pass various security requirements. For a company to obtain the ISO 27001 certification, it must agree to be examined by an internationally recognized, independent body for information…

Is My Public Cloud Too Public? Part 4

Is My Public Cloud Too Public? Part 4

Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level…

How Important Is Ethical Hacking For Enterprise Security Architecture?

How Important Is Ethical Hacking For Enterprise Security Architecture? With the increasing need for information security, business organizations which plan to adopt new technologies like IT outsourcing, virtualization, and cloud computing must be able to identify and face each security threats and come up with security architectures, policies, and processes. They must consider taking advantage…


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising