CloudTweaks

WordPress Security 101 – Protecting Against Insider Threats

By CloudTweaks | October 18, 2017

Protecting Against Insider Threats Continued from part 1 of our 5 part WordPress security series. A recent Breach Level Index report by Gemalto, a global cyber security solutions provider, is titled “Poor Internal Security Practices Take A Toll” for a reason. The

security wordpress 101

WordPress Security 101 – Securing Your WordPress Installation

By CloudTweaks | October 14, 2017

WordPress Security 101 Roughly 37,000 websites are breached daily. Considering WordPress powers at least 53% of all websites, you can bet a lot of bloggers have to deal with a website hijacking situation. So, don’t leave anything to chance – your blog is

IBM scientists Thomas Brunschwiler and Rahel Straessle are developing machine learning algorithms to interpret the IoT data.

Using IoT and machine learning to track the progression of lung disease

By CloudTweaks | October 13, 2017

IoT Tracking Progression of Lung Disease (Image Source: IBM scientists Thomas Brunschwiler and Rahel Straessle) Chronic obstructive pulmonary disease, a.k.a. COPD, is a progressive lung disease which causes breathlessness and is often caused by cigarette smoke and air pollution. By 2030, it is

What will the smart city of the future look like?

By CloudTweaks | September 28, 2017

What will the smart city of the future look like? Since the very first cities began to emerge over ten thousand years ago, cities such as New York, Dubai and Tokyo are now at the centre of the revolution of

First Things First. What Are Microservices?

By CloudTweaks | September 27, 2017

Innovation with Microservices Microservices are an engineering approach and architectural style of computing that is becoming extremely important for organizations wanting to innovate through a stronger engagement with their ecosystem of customers, suppliers and partners. To explain them should it

The Lighter Side Of The Cloud – Home Business

By CloudTweaks | September 25, 2017

By David Fletcher Sponsored Comic via Ring Central  Please contact us for more information on branded comics for your next presentation, event, newsletter, infographic or website blog post.

Target of the Next Big Breach

With Big Data Comes Big Responsibility: How to Avoid Becoming a Target of the Next Big Breach

By CloudTweaks | September 22, 2017

Avoid Becoming a Target of the Next Big Breach Practically every industry relies on Big Data, from education, government, and healthcare to banking, manufacturing, and retail. With the rise of Big Data over the last ten years and the significant

Three Essential Ways to Keep your Cloud Infrastructure Secure and Reliable

By CloudTweaks | September 6, 2017

Keeping Your Cloud Infrastructure Secure Companies of all sizes are now truly embracing cloud computing according to research from IDC with spending up by almost 25% between 2016 and 2017, the overall figure predicted to almost double by 2020. If you’re responsible

Five Compelling Ways To Use Salesforce Campaigns

By CloudTweaks | August 28, 2017

Salesforce Campaigns Salesforce, commonly known as “The World’s Favorite CRM Software” builds business software on a subscription basis. CRM stands for “Customer Relationship Management” and helps a company keep track of their contacts and communication in order to maximize sales

jobs

How To Become an AWS Certified Solutions Architect

By CloudTweaks | August 23, 2017

AWS Certified Solutions Architect AWS launched its certification model to validate knowledge of professionals against ever changing standards of the industry. Before jumping into AWS certification, it is important to know what are the basic concepts of AWS and the

POPULAR

Financial Management Finds a Welcome Home in the Cloud

Financial Management Finds a Welcome Home in the Cloud

Cloud Based Financial Management The most cautious person in any organization is likely to be the CFO. After all, they’re ...
Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in ...
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
Chris Gerva

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a ...