Ransomware Cyber-Attacks: Best Practices and Preventative Measures

By Vibhav Agarwal | May 29, 2017

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, and other organizations across more than 150 countries. The ransomware encrypted user data, and demanded a payment in bitcoins to…

Principles of an Effective Cybersecurity Strategy

By Vibhav Agarwal | April 18, 2017

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party…

5 Recommendations for Effective Governance, Risk and Compliance Management

By Vibhav Agarwal | February 20, 2017

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a corporate ‘no-cloud’ policy will be…

5 Simple Tips to Make Strong and Robust Business Continuity Plans

By Vibhav Agarwal | November 17, 2016

Business Continuity Plans Today’s organizations need comprehensive and robust business continuity planning for swift and effective action in case of a disaster or crisis. As the trade and supply chain have gone global, businesses today expect crisis response to be…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

By Vibhav Agarwal | October 18, 2016

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector…

Four Tips For Better Information Security In The Cloud

By Vibhav Agarwal | September 21, 2016

Information Security Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data to it. Unlike the early days of cloud, now, there is wider acceptance that cloud-based data can be as secure…

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

By Vibhav Agarwal | August 18, 2015

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects…

Layering Governance Over Cloud: Do Not Re-Build Perpetually!

By Vibhav Agarwal | May 5, 2015

Layering Governance Over Cloud  As the latest Amazon earnings announcement for AWS suggests, enterprises have adopted cloud at a rapid pace over the last few years as a part of the emerging Bimodal IT paradigm. However, given the focus on…

Cloud Security: How Can GRC Help?

By Vibhav Agarwal | February 26, 2015

Cloud Security An integrated GRC approach to cloud acceptance, adoption and scale includes the risk perspective from the beginning. Harnessing the power of cloud security with a GRC framework can promote and improve information security practices and drive better business…

POPULAR

Cloud Access Management: Access Everywhere

Cloud Access Management: Access Everywhere

Cloud Access Management As the utilization of cloud applications has become a standard of using in nearly every industry, there ...
Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Battle of the Clouds: Multi-Instance vs. Multi-Tenant Architecture

Multi-Instance vs. Multi-Tenant Architecture  The cloud is part of everything we do. It’s always there backing up our data, pictures, ...
Research Report: Emergency Management Leaders Discuss the Security of Mobile, Remote Workers

Research Report: Emergency Management Leaders Discuss the Security of Mobile, Remote Workers

The Security of Mobile, Remote Workers Everbridge, Inc., a global software company that provides critical event management and enterprise safety ...
A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

A Ray of Digital Sunshine Here’s something that will bring a smile: As hurricane Irma was about to slam into ...
Secure Enterprise IoT Platform

Building a Secure Enterprise IoT Platform

Secure Enterprise IoT Platform In the past 12 months here on CloudTweaks I have discussed some topics that were focused ...
Metal Detecting Drone

The Rise Of The Metal Detecting Drone

Metal Detecting Drone Look up in the sky; it's a bird, no it's a plane. No, it is a swarm ...
Server-less Computing Necessitates A Significant Mind Shift

Server-less Computing Necessitates A Significant Mind Shift

Server-less is More The author of the Pied Piper of Hamelin, Robert Browning, is one of my favorite English poets ...
Do You Feel Lucky? Why Risk Losing Your Data?

Do You Feel Lucky? Why Risk Losing Your Data?

Why Risk Losing Your Data As your world goes increasingly digital, information and data are your family jewels. Protect them ...