Steve Prentice

PODCAST – EPISODE 1: Most Efficient Way To Transport Mega-petabytes Of Data

By Steve Prentice | March 12, 2017

CloudTweaks Podcast Discussing Cloud Security with Zohar Alon, CEO of Dome9. Also what is the fastest and most efficient way to transport mega-petabytes of data? Hint: it has 18 wheels. And our outsider’s perspective from Jeremy Daniel. Contact us for

How Printers Help Hackers Hide In Plain Sight

By Steve Prentice | January 26, 2017

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the table across from you in the coffee shop – the one who happens to be

Moving Test and Dev to the Cloud: How the “As-A-Service” Economy Delivers Tangible Benefits

By Steve Prentice | January 24, 2017

Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It’s something

When The Cloud Comes To The Black Friday Table

By Steve Prentice | November 24, 2016

Black Friday Black Friday, as most people know, is the busiest shopping day of the year, occurring immediately after U.S. Thanksgiving, and ushering in the “official” beginning of the Christmas/Holiday shopping season. Its name has come to represent the time

Security Audits, Cyberattacks and other Potential Front Line Issues

By Steve Prentice | November 23, 2016

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As

The DDoS That Came Through IoT: A New Era For Cyber Crime

By Steve Prentice | October 13, 2016

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than

Ransomware’s Great Lessons

By Steve Prentice | September 28, 2016

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them,

IoT: Connected Manufacturing Leads To Service as a Product

By Steve Prentice | March 9, 2016

Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against

The Lurking Threat Called Passivity

By Steve Prentice | February 22, 2016

The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around

Security: The Goodwill Virus That Keeps On Giving

By Steve Prentice | February 11, 2016

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story in June 2015, the event was unique not only for the groundbreaking content but in the way it was produced.

POPULAR

Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Safeguarding Data Before Disaster Strikes

Safeguarding Data Before Disaster Strikes

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data ...
Imminent IoT Eye-Tracking Technologies To Transform The Connected World

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ ...
What’s Next In Cloud And Data Security For 2017?

What’s Next In Cloud And Data Security For 2017?

Cloud and Data Security It has been a tumultuous year in data privacy to say the least – we’ve had ...
Financial Management Finds a Welcome Home in the Cloud

Financial Management Finds a Welcome Home in the Cloud

Cloud Based Financial Management The most cautious person in any organization is likely to be the CFO. After all, they’re ...
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
Cloud Services Are Vulnerable Without End-To-End Encryption

Cloud Services Are Vulnerable Without End-To-End Encryption

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
What is shadow IT?

How to Make the Move to the Cloud Securely

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state ...