RANSOMWARE TRACKING MAPS
Ransomware refers to malicious software that blocks access to a computer system until a ransom is paid. Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia...

norse-file-compressor

How to Avoid Becoming Another Cloud Security Statistic

By Chris Gervais | August 22, 2017

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused by user error. This means that organizations, rather than service providers, are much more likely to be responsible for issues,…

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

By Karen Gondoly | August 21, 2017

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put organizations around the world on high alert. Even those of us lucky enough not to be infected suddenly had a…

10 Ways The Enterprise Can Prevent Data Leaks In The Cloud

By Daren Glenister | August 17, 2017

Prevent Data Leaks In The Cloud More companies are turning to the cloud for storage. In fact, over 60 percent of organizations store sensitive information in the cloud, according to a recent Intel security survey. As a result, the risk…

Recent Articles

Death of Traditional Enterprise Storage

By David Gildea | September 18, 2017

Traditional Enterprise Storage Back in 2003, Chris Pinkham and Benjamin Black, two engineers working for Amazon.com, proposed a dramatic overhaul of the company’s computing infrastructure. In a paper written for CEO Jeff Bezos, the pair envisioned a new system that…

A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

By John Pientka | September 18, 2017

A Ray of Digital Sunshine Here’s something that will bring a smile: As hurricane Irma was about to slam into Florida, Elon Musk boosted the maximum range for evacuating Tesla owners for free and remotely. A very neat trick but…

Inside the Equifax Hack

Was the Data Just Too Big? Inside the Equifax Hack

By Daniel Matthews | September 15, 2017

Inside the Equifax Hack Equifax is a gigantic financial organization, the entire livelihood of which revolves around collecting and analyzing consumer credit data to assign credit scores. If any organization knows how to handle big data and keep it secure,…

Mobile App Usage Shifts to Business and Technology

By Kiril Kirilov | September 15, 2017

Mobile Business Apps Mobile apps used to be a dream come true for game developers and studios but the latest consumer surveys show a lasting shift to travel, business and technology applications. In the first half of 2017, mobile apps…

Driving Transformation? It is possible to predict the future.

By Paul Boris | September 14, 2017

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation – what is your real objective, how will it transform your business and what will be the outcome for your customers. But as Henry Ford said, “Vision without…

Initial Coin Offering

Startup Fund Raising Through An Initial Coin Offering (ICO)

By Kiril Kirilov | September 14, 2017

What Is An Initial Coin Offering (ICO)? Do you possess Bitcoin or another cryptocurrency? If so, you can easily invest in a growing number of startups raising funds through Initial Coin Offering (ICO) instead of Initial Public Offering (IPO). IPOs…

What Skills Do I Need to Become a Data Scientist?

By Ronald van Loon | September 13, 2017

Becoming a Data Scientist Leveraging the use of big data, as an insight-generating engine, has driven the demand for data scientists at enterprise-level, across all industry verticals. Whether it is to refine the process of product development, help improve customer…

cloudtweaks comic humor

POPULAR

Best Practices in Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Hope for the best, prepare for the worst, and expect to be surprised. While that ...

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
legacy

Experts Believe Multi-cloud Implementations Can Be Invaluable

Multi-Cloud Environment The outage this week at Amazon Web Services S3 cloud storage services has created quite a stir, with ...

Most Active Internet Of Things Investors In The Last 5 Years

Internet Of Things (IoT) Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its ...
Innovative New Technologies

Innovative New Technologies To Look For In 2017

Innovative New Technologies As with every year in IT, 2017 brings a new batch of different trends and exciting technologies ...

The Massive Growth of the IoT Services Market

Growth of the IoT Services While the Internet of Things has become a popular concept among tech crowds, the consumer ...

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason ...

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and ...

10 Companies To Watch In 2017

Companies To Watch We are sure 2017, much like 2016, is going to be another amazing year for technology and ...

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...

The Cloud Movement – The Good and the Bad

The Cloud Movement Like it or not, cloud computing permeates many aspects of our lives, and it’s going to be ...

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...

Syndicated Technology News

larry-ponemon

2017 Ponemon Institute Study Finds SMBs are a Huge Target for Hackers

By CloudBuzz | September 19, 2017

Negligent Employees and Poor Password Policies are the Weakest Links Negligent employees are the #1 root cause behind data breaches across North America and the UK Ransomware is hitting SMBs hard with more than 50% experiencing an attack Attacks are becoming costlier…

Virtual Reality: Coming Soon to a Cubicle Near You?

By CloudBuzz | September 18, 2017

Cisco invites customers to experiment with Cisco Spark in VR SAN JOSE, CA–(Marketwired – Sep 18, 2017) – Cisco (NASDAQ: CSCO) thinks it is only a matter of time before virtual reality makes a major impact on all sorts of industries…

Hackers compromised free CCleaner software, Avast’s Piriform says

By CloudBuzz | September 18, 2017

Hackers compromised free CCleaner software SAN FRANCISCO (Reuters) – Hackers broke into British company Piriform’s free software for optimizing computer performance last month potentially allowing them to control the devices of more than two million users, the company and independent…

Facebook hires AI expert, launches lab in Canada’s Montreal

TORONTO (Reuters) – Facebook Inc (FB.O) has hired artificial intelligence academic Joelle Pineau to head its new research lab in Montreal, the Silicon Valley social media company said on Friday. Once the exclusive domain of academic researchers, artificial intelligence has…

CyberHub Summit Welcomes Shark Tank’s Robert Herjavec to Cybersecurity Summit November 8-9, 2017, Atlanta, GA

Atlanta, GA, hosts inaugural International Cybersecurity Summit, November 8-9, OMNI Hotel @ CNN Center ATLANTA, Sept. 15, 2017 /PRNewswire/ — “CyberHub Summit is an essential conference for C-suite level executives to attend,” says Karin Zalcberg, Israeli-born US-based Cybersecurity executive and CEO of CyberHub Summit. “Look at what…