Cisco News

Cisco and IBM Cloud Announce Hybrid Cloud Partnership

In the current day journey towards application modernization, enterprises have a growing need to not only bring together the agility of newer microservice architectures and application development platforms like Kubernetes, but also align those capabilities with their existing middle-ware, databases, and processes. Trying to meet
/
Bloomberg

The Trade War Is Set to Hit Tech, but Not as Hard as Your Wallet

Over the last year, technology companies were hopeful they might remain at least somewhat shielded from an intensifying bilateral trade war. After numerous exemptions, a far-reaching tax hike is finally poised to reach tech products. If it happens, large tech companies, at least, will be
/

Security Resources

We have a compiled a small list of interesting free security tools and resources as part of our ongoing effort to provide many of the best curated discoveries to our readership. Please continue to visit CloudTweaks as we will be providing several new and updated lists. You can also visit our archived articles covering server, network security scanning as well as performance monitoring tools.

Threat Cloud

Security Tools

Real time visualization of worldwide cyber attacks showing both the attacking and target country, as well as the malware used for the specific attack. The website also counts the total number of daily cyber attacks worldwide. Visitors can view which are the most attacked countries and where from these attacks originate.

Kaspersky Cybermap

Malware detection flow visualization that uses Kaspersky data to show cyber threats discovered worldwide. It also displays botnet activity. Visitors can view cyber threat stats for a selected country.

Digital Attack Map

Security Map

Displays daily statistics on the large and unusual DDoS attacks all over the world. Visitors can view which countries are experiencing unusual high traffic of cyber attacks for a given day and sort attacks by type, duration, source port, and destination port. Real time and pause mode.

Threatbutt

Shows detected global cyber attacks in real time. Visitors can view the attacking and the target IP addresses. The website displays the type of malware used, including unknown malware.

Fire Eye

Real time visualization of global cyber attacks. Displays the total number of detected daily attacks as well as the five most attacked industries for the past 30 days. The service lists detected attacks in real time and shows attacking and target country.

HaveIbeenpwned

Visitors can check if they have an online account that was compromised in a data breach. Visitors can enter an email address or username to be checked and then get a list of possibly compromised accounts with information what type of data was compromised in the specific hacking attack.

Hackaday

Hardware and software tips for advanced users who want to tweak their hardware or take advantage of cheap source hardware that can be upgraded to perform advanced functions. Visitors can find useful tips and tricks about various hardware topics.

Hackerone

Bug bounty and vulnerability disclosure platform that also hosts a large community of white-hat hackers. Visitors can explore a list of hacker activity and bug bounties awarded. Clicking on a vulnerability report displays info about the severity of a possible bug and its eligibility for a bug bounty.

Downdetector

Displays information about the top weekly online service outages. Visitors can check which companies are currently experiencing downtime issues or select a company from their list. Info about past outages is available.

Threat Metrix

Threat Metrix provides a fairly unquie fraud detection map.  It offers a feed highlighting the origin of account takeover attempts, payment fraud and identity spoofing attempts around the world.

By Kiril V Kirilov

Kiril Kirilov

Kiril V. Kirilov is a content strategist and writer who is analyzing the intersection of business and IT for nearly two decades. Some of the topics he covers include SaaS, cloud computing, artificial intelligence, machine learning, IT startup funding, autonomous vehicles and all things technology. He is also an author of a book about the future of AI and BIg Data in marketing.

Mark Casey Apcela

Why Enterprises Need Communication Hubs for Today’s WAN

Enterprise Communication Hubs As early as 2014, Gartner analysts were touting the benefits of communication hubs as a means to ...
To Migrate or to Not Migrate: In-House vs. Outsourced Cloud

To Migrate or to Not Migrate: In-House vs. Outsourced Cloud

In-House vs. Outsourced Through working as an executive in the managed DNS industry for over 15 years, I have become a ...
Podcast #3: Show-rooming, Blockchain, and the Content Your Commerce Site Needs

Podcast #3: Show-rooming, Blockchain, and the Content Your Commerce Site Needs

CLOUDTWEAKS PODCAST It’s not your grandma’s SEO. Using content management to promote your ecommerce business is a lot different than ...
10 Online Savings and Wealth Management Services

10 Online Savings and Wealth Management Services

Wealth Management Services There are a lot of cloud based options for those of you wanting to save for a ...
Bloomberg

The Trade War Is Set to Hit Tech, but Not as Hard as Your Wallet

/
Over the last year, technology companies were hopeful they might remain at least somewhat shielded from an intensifying bilateral trade war. After numerous exemptions, a far-reaching tax hike is finally ...
Tech Crunch

Libra currently looks more like a fiat currency than a cryptocurrency

/
Facebook unveiled a cryptocurrency called Libra yesterday as well as the Libra Association, a not-for-profit that will oversee all things Libra. While Libra’s white paper draws a lot of inspiration from other cryptocurrencies, the current ...
Cloud Infographic

New 2019 Cloud Security Research Reveals Key Challenges for Security Professionals

/
Data Loss and Leakage, Unauthorized Access Top List of Cloud Security Concerns SAN ANTONIO--(BUSINESS WIRE)--Security professionals continue to face a number of major challenges as more organizations move legacy IT ...