Chris Gervais

Chris Gervais

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused by user error. This means that organizations, rather than service providers, are much more likely to be responsible for issues,

Chris Gervais

Why Containers Can't Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason – they are lightweight and flexible. For many organizations, they enable the next step of platform maturity by reducing the needs of a runtime to

Chris Gervais

Vulnerability vs. Exploitability: Why they’re different & why it matters

Vulnerability vs. Exploitability There is a lot of jargon when it comes to cloud security. While the thought of having a vulnerability in security system seems scary, having an easily exploitable security system is scarier. What’s the difference? How do

Chris Gervais

Resolving the Normalization of Deviance by Building a Culture of Communication

Building a Culture of Communication Real-time monitoring and corresponding alerts are critical for maintaining the performance and security of today’s complex cloud infrastructures. Given the exorbitant amount of data effective network monitoring can produce, however, a troublesome problem often occurs:

Chris Gervais

The Cloud Isn’t a Security Issue; It’s a Security Opportunity

Security Issue In order to stay ahead in today’s competitive business landscape, companies need to constantly innovate. Development teams must continually release new products, features or services and cloud technology, along with agile development practices, make this perpetual iterating feasible.

Chris Gervais

Why An Inside-Out Approach to Cloud Security Is Your Safest Bet

Cloud Security In September, McKinsey released what might be looked back upon as a seminal survey. It opened the report with a simple, powerful declaration: “The cloud debate is over.” The data told a story that the pace of IT

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How

Are Smart Pills a Smart Idea for the IoT?

Smart Pills and IoT It stands to reason that the medical industry would be the most likely place for groundbreaking and disruptive tech advancement. An aging baby boomer population—a huge slice of America as we know it—is seeking to prolong

The Evolution of Data Transfer

Data Transfer Whether due to a lack of time, need or simply because email started at such an advanced stage, digital data-transfer systems have not progressed as far as physical delivery system. Centuries ago, Greek soldiers carried messages across great

Thought Leadership, CxO and Influencers

Senior Writer, Technology Consultant | CloudTweaks
Security and Privacy Leader
CTO, IoT and Analytics | Hitachi Vantara
Founder & CEO | Egnyte
CMO | Cisco, Webex
Director of Product Marketing | MetricStream
Field CTO | Intralinks
President and CEO | Wasabi
CEO | City Network, OpenStack Foundation Board Member
CEO | Leostream Corporation
CEO | ACUMATICA

Are you a CxO or Thought leader working with a reputable company and looking for free profile exposure? If so, get in touch!