Coke’s Internal Data Breach – Lessons Learned

ScottWalters

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and

Enjoy Full Article

3 Recommended Whitepapers: “Mastering Google Apps In The Classroom”

w_back07c4

3 Recommended Whitepapers: “Mastering Google Apps in the Classroom” Google Apps are a big part of the current cloud infrastructure providing a number of services to businesses of all sizes. Here are 3 recommended research papers to read over this week.   “Mastering Google Apps in the Classroom“ Has your school joined the Google revolution? This

Enjoy Full Article

Security Considerations While Moving To The Cloud

big-data-fraud

Security Considerations While Moving To The Cloud It is always difficult to maintain in-house IT operations at the cutting edge of efficiency. Whether it is a question of getting enough budgets approved or keeping all stakeholders happy, life for technical managers is never easy. On the other hand, clouds have certain inherent advantages. Big cost

Enjoy Full Article

The Three Modern Solutions For Cyber Security In The Cloud

The Three Modern Solutions For Cyber Security In The Cloud Various governments have adopted various approaches to their cloud policies. The Australian authorities, for example, have defined clearly who is liable for loss of data in a foreign server in data compromises that involve independent clients: the local company providing the storage service. There is

Enjoy Full Article

How IT Can Impact Every Area Of Business

How IT Can Impact Every Area of Business  (And 6 free assets to help you make best use of it) We live in an Information Age, and Information Technology (IT)  is the tool which allows businesses to flourish in this era. From communication to security, from operations to finance, IT permeates every area of business.

Enjoy Full Article

Some Reasons Behind Cloud Security Vulnerabilities

cloud security

Some Reasons Behind Cloud Security Vulnerabilities We have debated back and forth that the Cloud is just as safe as the traditional enterprise option, and even more so. Combined with all the advantages, it is a better option for today’s business world. But the security fears are always just around the corner and pops up

Enjoy Full Article

Understanding Technical Debt: Cutting Corners That Can Cost You Later

cut-costs-cloud

Understanding Technical Debt: Cutting Corners That Can Cost You Later Cloud technologies are known to offer many benefits, but it’s safe to say that two words dominate expectations when it comes to development cycles: faster and nimbler. As more organizations implement agile development, it’s becoming clear that expedited time to market is an expected standard

Enjoy Full Article

Four Free Information Assets For The Mid-Size Company CIO

Four Free Information Assets for the Mid-Size Company CIO “Knowledge is of no value unless you put it into practice.”                                            – Anton Chekov (1860-1904), Russian playwright and master of the modern short story. At CloudTweaks, we know that many of our readers are looking for ways to better leverage cloud computing at their workplaces.

Enjoy Full Article

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer (Part 1)

The_Pirate_Bay_logo

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer Perhaps the strongest reason deterring people from moving their virtual assets to the cloud is the feeling that their data may not be secure there. The IT world is already building myths about security hackers that could and still

Enjoy Full Article

Is My Public Cloud Too Public? Part 4

Cloud Security

Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level

Enjoy Full Article