CloudTweaks

blockchain credit security

Is blockchain a solution for credit security?

By CloudTweaks | December 11, 2017

Blockchain Credit Security In the last 30 years, FICO scores were considered a reliable solution to measure creditworthiness and attach a risk score to each applicant. As the sub-prime mortgage crisis of 2008 proved it, this system was neither accurate

How artificial intelligence and analytics helps in crime prevention

By CloudTweaks | December 7, 2017

How Artificial Intelligence Helps Crime Prevention According to a study released by FBI, there is an annual increase of 4.1% in violent crimes and 7.4% in motor-vehicle thefts in the United States in 2016. Despite having stringent laws and intense

Endpoint Security

WordPress Security 101 – Endpoint Security And Disaster Preparedness

By CloudTweaks | November 17, 2017

Endpoint Security And Disaster Preparedness Continued from part 4 Setting up a secure password for your admin dashboard is a tactic that sets you on the right track to a robust WordPress security. But one smart tactic, or a combination

A Quick and Dirty Guide to GDPR Compliance

By CloudTweaks | November 15, 2017

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union will go into effect. Although its goal to protect consumer data is admirable, about a third of global companies don’t know whether

GDPR Compliance: A Network Perspective

By CloudTweaks | November 7, 2017

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating actions that a company can or cannot take – they do a really good job of telling us what we

Fake Digital Currency

WordPress Security 101 – Securing Your Plugins, Themes, and Services

By CloudTweaks | November 3, 2017

Securing Your Plugins, Themes, and Services Continued from part 3 of our 5 part WordPress security series. For web scribblers who use WordPress, security should always come first since news of exploited vulnerabilities crop up with intensifying frequency. WordPress powers 74.7 million websites

Here’s everything you need to know about serverless architectures

By CloudTweaks | November 1, 2017

Serverless Architectures Serverless is an increasingly popular approach to software development that is growing extremely fast in companies of all sizes. The launch of AWS Lambda in 2014 kicked off the serverless movement, and many other cloud providers followed by

The Cloud Debate – Private, Public, Hybrid or Multi Clouds?

By CloudTweaks | October 26, 2017

The Cloud Debate Now that we’ve gotten over the hump of whether we should adopt the cloud or not, “which cloud” is now the center of the debate. It feels like that one multiple choice question on an exam that

WordPress Security 101 – Internal Monitoring Systems and Web Hosting

By CloudTweaks | October 25, 2017

Internal Monitoring Systems Securing your WordPress site requires a lot of adjustments, manual or automated. The “manual” mode relies on a wealth of plugins and little tweaks that give you granular control over what you can do, and how much

Built to Last: Choosing the Right Infrastructure Partner for Your Game

By CloudTweaks | October 23, 2017

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm Newzoo, they’ll drive roughly $108.9 billion in revenue for the industry by the end of this year. As video games

POPULAR

Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
What is shadow IT?

How to Make the Move to the Cloud Securely

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
What Futuristic Transportation Will Look Like In Your Lifetime

What Futuristic Transportation Will Look Like In Your Lifetime

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could ...