Tag Archives: vulnerability

Coke’s Internal Data Breach – Lessons Learned

Coke’s Internal Data Breach – Lessons Learned

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and…

3 Recommended Whitepapers: “Mastering Google Apps In The Classroom”

3 Recommended Whitepapers: “Mastering Google Apps In The Classroom”

3 Recommended Whitepapers: “Mastering Google Apps in the Classroom” Google Apps are a big part of the current cloud infrastructure providing a number of services to businesses of all sizes. Here are 3 recommended research papers to read over this week.   “Mastering Google Apps in the Classroom“ Has your school joined the Google revolution? This…

Security Considerations While Moving To The Cloud

Security Considerations While Moving To The Cloud

Security Considerations While Moving To The Cloud It is always difficult to maintain in-house IT operations at the cutting edge of efficiency. Whether it is a question of getting enough budgets approved or keeping all stakeholders happy, life for technical managers is never easy. On the other hand, clouds have certain inherent advantages. Big cost…

The Three Modern Solutions For Cyber Security In The Cloud

The Three Modern Solutions For Cyber Security In The Cloud Various governments have adopted various approaches to their cloud policies. The Australian authorities, for example, have defined clearly who is liable for loss of data in a foreign server in data compromises that involve independent clients: the local company providing the storage service. There is…

Some Reasons Behind Cloud Security Vulnerabilities

Some Reasons Behind Cloud Security Vulnerabilities

Some Reasons Behind Cloud Security Vulnerabilities We have debated back and forth that the Cloud is just as safe as the traditional enterprise option, and even more so. Combined with all the advantages, it is a better option for today’s business world. But the security fears are always just around the corner and pops up…

Understanding Technical Debt: Cutting Corners That Can Cost You Later

Understanding Technical Debt: Cutting Corners That Can Cost You Later

Understanding Technical Debt: Cutting Corners That Can Cost You Later Cloud technologies are known to offer many benefits, but it’s safe to say that two words dominate expectations when it comes to development cycles: faster and nimbler. As more organizations implement agile development, it’s becoming clear that expedited time to market is an expected standard…

Four Free Information Assets For The Mid-Size Company CIO

Four Free Information Assets for the Mid-Size Company CIO “Knowledge is of no value unless you put it into practice.”                                            – Anton Chekov (1860-1904), Russian playwright and master of the modern short story. At CloudTweaks, we know that many of our readers are looking for ways to better leverage cloud computing at their workplaces.…

Popular

Top Viral Impact

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some…

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts

Cloud Infographic – Cloud Fast Facts It’s no secret that Cloud Computing is more than just a buzz term as that ship has sailed off a long time ago. More and more companies are adopting the uses and benefits of cloud computing while aggressively factoring cloud services spending into their budget. Included is an excellent…

Cloud Infographic: The Education Of Tomorrow

Cloud Infographic: The Education Of Tomorrow

Cloud Infographic: The Education Of Tomorrow  Online Education is a very exciting topic for many as it opens up many new doors and opportunities. We’ve touched on areas such as Massive Open Online Sources (MOOC) which provides tremendous levels of cloud based interconnectivity. We’ve taken a look into higher education,  the increased demand for online courses as well as…

IBM and SAP Announce Industry’s Largest Cloud Deal

IBM and SAP Announce Industry’s Largest Cloud Deal

IBM and SAP Announce Industry’s Largest Cloud Deal IBM and SAP have shaken the cloud computing world this afternoon with the announcement of one of the largest cloud deals in the industry’s history – bringing together two of the largest technology companies in a bid to offer a more holistic service to their clients. SAP…

Whitepapers

Top Research Assets

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too

IT Security: Think Like A Thief – And An Average Joe, Too With security threats to information services growing in sophistication, frequency and variety, IT professionals on all sides of the marketplace are realizing an urgent need to reinvent themselves to better anticipate the bewildering variety of attacks that they and their customers face. The…

Advertising Programs

Click To Find Out More!!

Sponsored Posts

Sponsored Posts

Advertising Package Options 2015 We have a dedicated readership, through our online, social media and email presence. Our goal is to continue to build our growing community, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more. In order to do so, we require the support from businesses looking to generate more…

Contributors

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to…

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud (5 Warnings)

Migrating to a Business Cloud  In theory, migrating to cloud computing should be easy. Choose a cloud provider, move the files to the data server and everything is good to go. While that may work for the personal cloud, migrating into a business cloud format is a lot more complicated. As Ann Bednarz pointed out…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

CloudBuzz

Popular News Sources

‘Sophisticated’ Regin spyware found

‘Sophisticated’ Regin spyware found

An “extremely complex” and “stealthy” spying program has been stealing data from ISPs, energy companies, airlines and research-and-development labs, a security company says. Read the source article at BBC – Homepage

Powerful New Cyber Espionage Program Said Discovered

Powerful New Cyber Espionage Program Said Discovered

An extremely sophisticated computer spying program called Regin has been spying on computers in Saudi Arabia, Russia, and other countries since at least 2008, security company Symantec says. Read the source article at WSJ Blogs