Vibhav Agarwal

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

By Vibhav Agarwal | May 29, 2017

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to

Principles of an Effective Cybersecurity Strategy

By Vibhav Agarwal | April 18, 2017

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party

5 Recommendations for Effective Governance, Risk and Compliance Management

By Vibhav Agarwal | February 20, 2017

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a corporate ‘no-cloud’ policy will be

5 Simple Tips to Make Strong and Robust Business Continuity Plans

By Vibhav Agarwal | November 17, 2016

Business Continuity Plans Today’s organizations need comprehensive and robust business continuity planning for swift and effective action in case of a disaster or crisis. As the trade and supply chain have gone global, businesses today expect crisis response to be

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

By Vibhav Agarwal | October 18, 2016

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector

Four Tips For Better Information Security In The Cloud

By Vibhav Agarwal | September 21, 2016

Information Security Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data to it. Unlike the early days of cloud, now, there is wider acceptance that cloud-based data can be as secure

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

By Vibhav Agarwal | August 18, 2015

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects

Layering Governance Over Cloud: Do Not Re-Build Perpetually!

By Vibhav Agarwal | May 5, 2015

Layering Governance Over Cloud  As the latest Amazon earnings announcement for AWS suggests, enterprises have adopted cloud at a rapid pace over the last few years as a part of the emerging Bimodal IT paradigm. However, given the focus on

Cloud Security: How Can GRC Help?

By Vibhav Agarwal | February 26, 2015

Cloud Security An integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practices and drive better business

THOUGHT LEADERSHIP ARCHIVE

Preventing Disastrous Events Through The Power of Anomaly Detection In Machine Data

By CloudTweaks

Preventing Disastrous Events Through the Power of Anomaly Detection in Machine Data In August, a single server failed and the NASDAQ went down for three hours. In January, GlobalPayments reported that a hack compromising millions of credit card accounts cost

Cloud Native Trends Picking Up – Legacy Security Losing Ground

By Chenxi Wang

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in

Mark Carrizosa

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

By CloudTweaks

Record Breaches Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its

GDPR Compliance

A Quick and Dirty Guide to GDPR Compliance

By Brad Thies

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union will go into effect. Although its goal to protect consumer data is admirable, about a third of global companies don’t know whether

Online File Sharing And The Importance Of Security

By Charles Mount

Online File Sharing Security Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at

Business Versus Technical Cloud Service Brokers And Why It Matters

By CloudTweaks

Cloud Service Brokers Gartner predicts “By 2015, at least 20% of all cloud services will be consumed via internal or external cloud service brokerages, rather than directly, up from less than 5% today.” Thus, it is important to understand what

Want to dip your toe into the cloud? Challenges of a Large Migration

By James Kessinger

Challenges of a Large Migration Migrating to the cloud can be a daunting task. First you have to go through an exhaustive process deciding what to migrate, then you have to do plenty of scripting and re-architecting to get all

Three Tips For Tackling Bring Your Own Cloud (BYOC) Within Your Organization

By CloudTweaks

(BYOC) Within Your Organization It’s the latest tech acronym: BYOC or Bring Your Own Cloud. Personal cloud services are convenient, inexpensive, and always available. They also have the potential to wreak havoc on the enterprise in ways we haven’t seen

Cybercrimes And The Growing Importance Of SDN Technology

By CloudTweaks

Last months Cloud Security Alliance Central Eastern Europe Summit gave a good opportunity to learn about the Cloud Computing market in areas of Europe that are less reviewed. The congress, held in the center of the old city of Ljubljana,

The Paradigm Shift In Enterprise IT Operations Management

By Sheetal Kale

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology landscape and the demands of the customers coupled with Enterprises wanting to stay competitive. This changing, fluid environment results in

Technology Cloud Contributor

IoT Data Centers – “We’ve Always Done IoT, We’re Just Terrible At Marketing It”

IoT Data Centers An often repeated phrase by many data center professionals is “We’ve always done IoT, we’re just terrible ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Matthew Cleaver

Dispelling the Myths of Cloud Solutions for the Small Business

Dispelling the Myths of Cloud Solutions As a business leader, migrating to the cloud can be overwhelming due to the ...
Cloud Migration and Cyberwar

Cloud Migration and Cyberwar

Cyberwar Concerns This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically ...
Terrified of the Coming of Artificial Intelligence (AI)? Don’t Be. Now You Can Rent Your Own!

Terrified of the Coming of Artificial Intelligence (AI)? Don’t Be. Now You Can Rent Your Own!

Now You Can Rent Your Own! Beware the coming of AI! Or so say luminaries like Bill Gates, Stephen Hawking ...
The IoT-Connected Car of Today - Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today – Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today Imagine a world where your car not only drives itself, but also says intelligent things ...