Steve Prentice

PODCAST – EPISODE 1: Most Efficient Way To Transport Mega-petabytes Of Data

By Steve Prentice | March 12, 2017

CloudTweaks Podcast Discussing Cloud Security with Zohar Alon, CEO of Dome9. Also what is the fastest and most efficient way to transport mega-petabytes of data? Hint: it has 18 wheels. And our outsider’s perspective from Jeremy Daniel. Contact us for

How Printers Help Hackers Hide In Plain Sight

By Steve Prentice | January 26, 2017

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the table across from you in the coffee shop – the one who happens to be

Technology Certification Courses

Moving Test and Dev to the Cloud: How the “As-A-Service” Economy Delivers Tangible Benefits

By Steve Prentice | January 24, 2017

Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It’s something

When The Cloud Comes To The Black Friday Table

By Steve Prentice | November 24, 2016

Black Friday Black Friday, as most people know, is the busiest shopping day of the year, occurring immediately after U.S. Thanksgiving, and ushering in the “official” beginning of the Christmas/Holiday shopping season. Its name has come to represent the time

Security Audits, Cyberattacks and other Potential Front Line Issues

By Steve Prentice | November 23, 2016

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As

tech

The DDoS That Came Through IoT: A New Era For Cyber Crime

By Steve Prentice | October 13, 2016

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than

Ransomware’s Great Lessons

By Steve Prentice | September 28, 2016

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them,

IoT: Connected Manufacturing Leads To Service as a Product

By Steve Prentice | March 9, 2016

Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against

The Lurking Threat Called Passivity

By Steve Prentice | February 22, 2016

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around

Security: The Goodwill Virus That Keeps On Giving

By Steve Prentice | February 11, 2016

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced.

THOUGHT LEADERSHIP ARCHIVE

5 Ways New Technology is Having an Impact on the Energy Sector

By Eric Hebert

Tech Energy Sector We’ve discussed here in the past how cleantech (a blanket term that includes technologies that affect recycling, renewable energy, transportation, and others) is moving energy efficiency into the cloud, and how there are many very well-known technology

Move Over Brick And Mortar, Education-As-A-Service Is Taking Over

By Scott Skinger

Education-As-A-Service As Bob Dylan once said, “the times they are a-changin’.” Its a verse that sticks like glue in the back of my mind when I reflect on the technology landscape today. Just a few years ago, data analytics services

Learning From Past Mistakes: Predictions For Cybersecurity

By Larry Jones

Predictions Cybersecurity From Ashley Madison to the Office of Personnel Management (OPM), hackers did not discriminate between organizations or industries when it came to unleashing cyber-attacks in 2015. This past year, data breaches affected millions of people with headlines of

The Five Rules of Security and Compliance in the Public Cloud Era

By Suda Srinivasan

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked

Stuck In The Clouds: The Issue Of Data Ownership

By Bob Greenlees

The Issue Of Data Ownership While the immediate benefits of cloud services are typically clear to new users, individuals and businesses alike are becoming increasingly aware of a looming issue: vendor lock-in. As these users amass large amounts of data in

Why Reliable Cloud Performance Matters

By Richard Seroter

Reliable Cloud Performance People are right to be wary of any vendor claiming to be the “top performing!” or “fastest!” cloud provider. Most folks know that ANYTHING can look spectacular – or unspectacular for that matter – if you stack

Are Leading Tech Companies A Threat To Older Tech

By Sharon Florentine

Leading Tech Companies Almost exactly a year ago, The Informational Data Corporation (IDC) made some pretty bold predictions regarding cloud computing companies and the development of a new high-tech industry in the convergence of social networking, and cloud-based computing and

How to Improve the Backup Success Rate of Data Centers?

By Cloud Syndicate

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing across various tiers of data centers. This impacts datacenters heavily on revenue loss, SLA-based penalties, and customer experience. Furthermore, loss

The Managed Service Provider

Threatening Skies: The Managed Service Provider

By John Humphreys

The Managed Service Provider Business is not easy. Just when you think you have the market figured out, and your business is growing nicely, another new threat comes onto the horizon. Many VARs and MSPs who built successful businesses implementing

Built to Last: Choosing the Right Infrastructure Partner for Your Game

By Robert Van der Meulen

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm Newzoo, they’ll drive roughly $108.9 billion in revenue for the industry by the end of this year. As video games

Part 1 - How Cloud Apps Are Making Businesses More (and Less) Secure

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can ...
5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Terrified of the Coming of Artificial Intelligence (AI)? Don’t Be. Now You Can Rent Your Own!

Terrified of the Coming of Artificial Intelligence (AI)? Don’t Be. Now You Can Rent Your Own!

Now You Can Rent Your Own! Beware the coming of AI! Or so say luminaries like Bill Gates, Stephen Hawking ...
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” ...
How Strategy – Not Technology – Is The Real Driver For Digital Transformation

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud ...