Principles of an Effective Cybersecurity Strategy

According to MetricStream’s, ‘The State of Cyber Security in the Financial Services Industry’ report, around 66 percent of financial services institutions have faced at least one cyber-attack in the last 12 months. The cost of this can even result in a complete shutdown of the business."

Vibhav Agarwal

WordPress Security 101 – Protecting Against Insider Threats

By CloudTweaks | October 18, 2017

Protecting Against Insider Threats Continued from part 1 of our 5 part WordPress security series. A recent Breach Level Index report by Gemalto, a global cyber security solutions provider, is titled “Poor Internal Security Practices Take A Toll” for a reason. The…

The Role of AI in Assisting Customer Experience

By Ronald van Loon | October 18, 2017

Assisting Customer Experience From being the plots of sci-fi thrillers to being seen as threats by the working populace, Artificial Intelligence (AI) has during the last few years jumped into the headlines as it has become a part of reality.…

Cloud Computing, AI and The Future of Language Translation

By John Pientka | October 17, 2017

The Tower of Babel Is Over Imagine: you are in a conference room with colleagues from China, Japan, Germany and Egypt. You each speak in your native tongue and the other participants hear it in their native tongue. Humans have…

Built to Last: Choosing the Right Infrastructure Partner for Your Game

By CloudTweaks | October 23, 2017

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm Newzoo, they’ll drive roughly $108.9 billion in revenue for the industry by the end of this year. As video games…

Cisco to buy BroadSoft in $1.9 billion deal

By CloudBuzz | October 23, 2017

(Reuters) – Cisco Systems Inc (CSCO.O), the world’s largest networking gear manufacturer, said it will buy U.S. telecommunications software company BroadSoft Inc (BSFT.O) in a deal valued at about $1.9 billion, including debt. Cisco said it would offer $55 per…

Cloudera Speeds Analytics Deployment for Cybersecurity Hub

By CloudBuzz | October 23, 2017

New Service Simplifies Path to Deploying Next Generation Cybersecurity Hub, Making Machine Learning Easier and Accessible PALO ALTO, Calif., Oct. 23, 2017 /PRNewswire/ — Cloudera, Inc., (NYSE: CLDR), the modern platform for machine learning and analytics, optimized for the cloud,…

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

By CloudBuzz | October 20, 2017

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ — The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced an updated ‘Treacherous 12:…

The Lighter Side Of The Cloud – The Money Grab

By David | October 20, 2017

By David Fletcher Please contact us for more information on how to license our comics for your next presentation, event, newsletter or website blog post.  ABOUT DavidDavid Fletcher was born in England in 1952. At school he excelled at drawing cartoons in…

POPULAR

Cloud Computing, AI and The Future of Language Translation

Cloud Computing, AI and The Future of Language Translation

The Tower of Babel Is Over Imagine: you are in a conference room with colleagues from China, Japan, Germany and ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
The Cloudification of Healthcare: Benefits and Risks

The Cloudification of Healthcare: Benefits and Risks

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The ...
Four Cloud Security Mega Trends

Four Cloud Security Mega Trends

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid ...
Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored ...
How Identity Governance Can Secure The Cloud

How Identity Governance Can Secure The Cloud

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of ...
Dum Da Dum Dum – Just the Facts Ma’am. The New World of Digital Policing

Dum Da Dum Dum – Just the Facts Ma’am. The New World of Digital Policing

The New World of Digital Policing It’s not your father’s police. You’re on camera. Predictive programs target crime. AI is ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...