THOUGHT LEADERSHIP PROGRAM

The CloudTweaks thought leadership contributor program is free to join and includes a customized profile, high visibility profile rotation, newsletter marketing, social amplification and more... Stand out as an expert in your field. 

The program is currently only available to consultants, influencers or executive level contributors.

The Power of Reframing and the Economics of Starting Pitching

By Bill Schmarzo | November 13, 2018

Economics of Starting Pitching I’m a big fan of Woody Allen’s earlier movies such as “Bananas”, “Sleeper” and especially the award winning “Annie Hall.”  One of the things that always impressed me about Woody Allen was his ability to reframe the

How the Oil Industry Can Benefit from IoT Technology

By Kelly Potter | November 8, 2018

Oil Industry Can Benefit from IoT In 2010, the Deepwater Horizon oil tragedy struck and took the nation’s attention for months. Two-hundred million gallons of oil spilled, 16,000 miles is the range it spread across the coastline from Florida to Texas, 8,000

Professional Services Gain Momentum in Data Protection Software Market

By CloudTweaks | November 7, 2018

While Dependency of Organizations Shifts towards In-house Cybersecurity Professionals A major overhaul of data security led by stringent regulatory mandates has caused a meteoric rise in the adoption of data protection tools. Every enterprise dealing with consumer data has to

Should Insurance Companies Be Using Big Data?

By Mike Brown | November 6, 2018

Insurance Companies and Big Data Your lifestyle, behavior, and attitudes can affect your health, and increasingly health insurance companies are finding ways to gather that information on you. With the rise of technology, many companies are compiling data sets that

The cloud is essential for innovation – but it must be run differently

By Tristan Morel L Horset | November 1, 2018

Function as a Service Capabilities The cloud has changed. Ten years ago, it was all about cost. The benefits were clear: your IT team could access resources as required – provisioning some storage here, spinning up a VM there –

The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust

By Louis Columbus | October 31, 2018

The Current State Of Cybersecurity 41% of total breaches in 2017 targeted the healthcare industry, making it the most popular target for breach attempts. Personally Identifiable Information (PII) combined with user credentials tops the percentage of breaches with 29% according

Four Puzzling Issues of Identity Authentication – Part 2

By Hitoshi Kokumai | October 30, 2018

Caveats about ‘Password’ Continued from Part 1… Sometimes the word ‘Password’ is narrowly interpreted as ‘remembered text password’ and sometimes it’s taken broadly as ‘whatever we remember for authentication’. We are of the view that it would be desirable to

Data Science “Paint by the Numbers” with the Hypothesis Development Canvas

By Bill Schmarzo | October 26, 2018

When I was a kid, I use to love “Paint by the Numbers” sets.  Makes anyone who can paint or color between the lines a Rembrandt or Leonardo da Vinci (we can talk later about the long-term impact of forcing kids

October 2018 Netskope Cloud Report

By CloudTweaks | October 25, 2018

With the increased adoption of public cloud infrastructure services like AWS in the enterprise, there’s also a growing need for clear identity and access policies to ensure sensitive enterprise data is secure. While many organizations have controls around cloud services

Four Puzzling Issues of Identity Authentication

By Hitoshi Kokumai | October 24, 2018

Four Puzzling Issues of Identity Authentication – Takeaways from Consumer Identity World USA 2018 – Introduction The so-called password-less authentication, if implemented literally, would lead us to a world where we are deprived of the chances and means to get

THOUGHT LEADERS

Four FinTech Trends To Look Out For

Four FinTech Trends To Look Out For

FinTech Trends The fintech industry witnessed an enormous growth in 2015. Around $7.6 billion were invested in fintech companies last ...
The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the ...
When it Comes to the Communications Cloud, You Cannot Manage What You Cannot Measure 

When it Comes to the Communications Cloud, You Cannot Manage What You Cannot Measure 

The Communications Cloud As more and more real-time communications – whether voice, messaging, video or collaboration – move to distributed software ...
The Cloud Has Your Data (Whether You Like It Or Not)

The Cloud Has Your Data (Whether You Like It Or Not)

Cloud Cleanup Anyone? Following on where we left off from my last two articles now we shift focus to what ...
Protect Your Small Business

Why Nonprofits Might Be at Higher Risk for Cyberattacks

Cyberattacks On Nonprofits Today's society is one where any organization operating online is theoretically at risk for cyberattacks. Such incidents ...
Numeraire Cryptocurrency

Numeraire Cryptocurrency Goes Live

Numeraire cryptocurrency Numerai, a hedge fund started in late 2015 by mathematician Richard Craib. The new Numerai cryptocurrency comprises digital ...
Open APIs Alone Won’t Change Banking

Open APIs Alone Won’t Change Banking

Open Banking API's Most people think of banks as one monolithic entity, but they are actually made up of hundreds ...
How Modern Architects Transform the Messy Mix of Hybrid Cloud into a Force Multiplier

How Modern Architects Transform the Messy Mix of Hybrid Cloud into a Force Multiplier

Modern Architects Transform The next BriefingsDirect cloud strategies insights interview focuses on how IT architecture and new breeds of service providers ...
Security Audits, Cyberattacks and other Potential Front Line Issues

Security Audits, Cyberattacks and other Potential Front Line Issues

Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other ...