Steve Prentice

PODCAST – EPISODE 1: Most Efficient Way To Transport Mega-petabytes Of Data

By Steve Prentice | March 12, 2017

CloudTweaks Podcast Discussing Cloud Security with Zohar Alon, CEO of Dome9. Also what is the fastest and most efficient way to transport mega-petabytes of data? Hint: it has 18 wheels. And our outsider’s perspective from Jeremy Daniel. Contact us for

How Printers Help Hackers Hide In Plain Sight

By Steve Prentice | January 26, 2017

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the table across from you in the coffee shop – the one who happens to be

Technology Certification Courses

Moving Test and Dev to the Cloud: How the “As-A-Service” Economy Delivers Tangible Benefits

By Steve Prentice | January 24, 2017

Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It’s something

When The Cloud Comes To The Black Friday Table

By Steve Prentice | November 24, 2016

Black Friday Black Friday, as most people know, is the busiest shopping day of the year, occurring immediately after U.S. Thanksgiving, and ushering in the “official” beginning of the Christmas/Holiday shopping season. Its name has come to represent the time

Security Audits, Cyberattacks and other Potential Front Line Issues

By Steve Prentice | November 23, 2016

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As


The DDoS That Came Through IoT: A New Era For Cyber Crime

By Steve Prentice | October 13, 2016

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than

Ransomware’s Great Lessons

By Steve Prentice | September 28, 2016

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them,

IoT: Connected Manufacturing Leads To Service as a Product

By Steve Prentice | March 9, 2016

Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against

The Lurking Threat Called Passivity

By Steve Prentice | February 22, 2016

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around

Security: The Goodwill Virus That Keeps On Giving

By Steve Prentice | February 11, 2016

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced.

The 3% Edge: How Data Drives Success in Business and the Olympics

The 3% Edge: How Data Drives Success in Business and the Olympics

Data Drives Success in Business A recent Bloomberg BusinessWeek article entitled “The Tech Guy Building Wearables for America’s Olympians” profiles ...
Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
Your Office 365 Data Security - Is It Properly Protected?

Your Office 365 Data Security – Is It Properly Protected?

Office 365 Data Security As more and more people collaborate and access data from outside the office and across multiple ...
Built to Last: Choosing the Right Infrastructure Partner for Your Game

Built to Last: Choosing the Right Infrastructure Partner for Your Game

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm ...

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...