Coke’s Internal Data Breach – Lessons Learned

ScottWalters

Last Friday, Coke announced that sensitive information belonging to roughly 70,000 current and former North American employees was compromised because the data hadn’t been encrypted on company laptops (despite their company encryption policy.)1 The data breach occurred after a former worker stole several company laptops that locally stored employee information, such as social security and

Enjoy Full Article

3 Recommended Whitepapers: “Mastering Google Apps In The Classroom”

w_back07c4

3 Recommended Whitepapers: “Mastering Google Apps in the Classroom” Google Apps are a big part of the current cloud infrastructure providing a number of services to businesses of all sizes. Here are 3 recommended research papers to read over this week.   “Mastering Google Apps in the Classroom“ Has your school joined the Google revolution? This

Enjoy Full Article

Security Considerations While Moving To The Cloud

big-data-fraud

Security Considerations While Moving To The Cloud It is always difficult to maintain in-house IT operations at the cutting edge of efficiency. Whether it is a question of getting enough budgets approved or keeping all stakeholders happy, life for technical managers is never easy. On the other hand, clouds have certain inherent advantages. Big cost

Enjoy Full Article

The Three Modern Solutions For Cyber Security In The Cloud

The Three Modern Solutions For Cyber Security In The Cloud Various governments have adopted various approaches to their cloud policies. The Australian authorities, for example, have defined clearly who is liable for loss of data in a foreign server in data compromises that involve independent clients: the local company providing the storage service. There is

Enjoy Full Article

How IT Can Impact Every Area Of Business

How IT Can Impact Every Area of Business  (And 6 free assets to help you make best use of it) We live in an Information Age, and Information Technology (IT)  is the tool which allows businesses to flourish in this era. From communication to security, from operations to finance, IT permeates every area of business.

Enjoy Full Article

Some Reasons Behind Cloud Security Vulnerabilities

cloud security

Some Reasons Behind Cloud Security Vulnerabilities We have debated back and forth that the Cloud is just as safe as the traditional enterprise option, and even more so. Combined with all the advantages, it is a better option for today’s business world. But the security fears are always just around the corner and pops up

Enjoy Full Article

Understanding Technical Debt: Cutting Corners That Can Cost You Later

cut-costs-cloud

Understanding Technical Debt: Cutting Corners That Can Cost You Later Cloud technologies are known to offer many benefits, but it’s safe to say that two words dominate expectations when it comes to development cycles: faster and nimbler. As more organizations implement agile development, it’s becoming clear that expedited time to market is an expected standard

Enjoy Full Article

Four Free Information Assets For The Mid-Size Company CIO

Four Free Information Assets for the Mid-Size Company CIO “Knowledge is of no value unless you put it into practice.”                                            – Anton Chekov (1860-1904), Russian playwright and master of the modern short story. At CloudTweaks, we know that many of our readers are looking for ways to better leverage cloud computing at their workplaces.

Enjoy Full Article

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer (Part 1)

The_Pirate_Bay_logo

Can Cloud Security Be Doubted When Even ThePirateBay Is Sailing There Now? – The Simple Answer Perhaps the strongest reason deterring people from moving their virtual assets to the cloud is the feeling that their data may not be secure there. The IT world is already building myths about security hackers that could and still

Enjoy Full Article

Is My Public Cloud Too Public? Part 4

Cloud Security

Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level

Enjoy Full Article

Document Security: Cloud Collaboration and Mobility

Document Security: Cloud Collaboration and Mobility It is no secret that the cloud, combined with today’s mobile technologies, has had a huge impact on how the world does business. The ability to send documents, update presentations and check email from tablets and other mobile devices from anywhere, at any time, offers many cost and time

Enjoy Full Article

Changing Business with Cloud Computing

Changing Business with Cloud Computing In today’s business climate, instant adaptation and scalability is critical. Planning and preparing for increased web traffic, spikes in the use of computer resources, disaster recovery, and day-to-day business operations is key. Loss of business due to system overload or breakdown leads not only to loss of revenue and customer

Enjoy Full Article

SaaS Market Is Growing Faster Than On-Premise: Marc Olesen, McAfee

By Varun Aggarwal What portion of your revenue comes from SaaS offerings? How do you expect it to grow? Globally, our SaaS business constitutes 5-10 percent of our revenue. We expect this to grow to 10-15 percent in the next couple of years. IDC has predicted a growth of 27 percent in the Security-as-a-Service (SaaS)

Enjoy Full Article