Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

The IoT-Connected Car of Today – Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

The IoT-Connected Car of Today – Cases From Hertz, Nokia, NTT, Mojio & Concur Technologies

By Ronald van Loon | March 23, 2017

The IoT-Connected Car of Today Imagine a world where your car not only drives itself, but also says intelligent things like these: A hotel is just around the corner and you have been driving for eight hours. Would you like…

How B2B Ecosystems & (Big) Data Can Transform Sales and Marketing Practices

By Ronald van Loon | March 21, 2017

B2B Ecosystems & (Big) Data Managing your relationships with customers, suppliers, and partners and constantly improving their experience is a proven way to build a sustainable and profitable business, and contrary to popular assumption, this doesn’t apply to B2C businesses…

Companies Must Be More Transparent About Security Moving Forward

By Kayla Matthews | March 21, 2017

Security and Transparency You may remember, Home Depot was affected by a sizeable data breach in 2014. The incident is widely considered one of the largest point-of-sale heists of all time because over 56 million credit cards were involved, read and…

Viewing Digital Payments as a Boulevard of Commerce

By Steve Prentice | March 20, 2017

Digital Payments A boulevard is a wide street that runs in two directions and usually has a median in the middle. This is important to remember for anyone looking to build a strategy for payment and commerce in the mobile…

Downtime recovery: Stats show what every enterprise should be doing

By CloudTweaks | March 17, 2017

Downtime Recovery Most business owners expect to face an IT failure at some point in their enterprise career. But, while these dreaded spells of down time have come to be considered an inevitability since the invention of the internet, that’s…

IoT, the Cloud, and Fog Computing

By Jennifer Klostermann | March 15, 2017

Fog Computing The Internet of Things (IoT) is increasingly part of all of our lives, personally and business-wise, and the efficiencies and conveniences it offers will likely encourage even greater adoption. An enormous amount of data is also being generated…

Navisite Automates Data Centers Worldwide with Cisco

By CloudBuzz | March 14, 2017

Cisco Application Centric Infrastructure (ACI) provides powerful policy-based, programmable automated architecture SAN JOSE, CA–(Marketwired – Mar 14, 2017) – Cisco (NASDAQ: CSCO) announced that Navisite, LLC., a part of Spectrum Enterprise and an international provider of managed cloud services, application…

Business, Big Data and the Human Element

By Jennifer Klostermann | March 14, 2017

Business Big Data Big data, not something one would expect a company’s HR team likely to devote much time to, is, in fact, a valuable resource more and more being utilized by people managers. Representing enormous amounts of collected information…

IoT developers

For Uber and Waymo’s Initiatives to Thrive, IoT Needs 4.5 Million Developers by 2020

By Daniel Matthews | March 10, 2017

IoT Developers Imagine it’s December, 2016, and you’re Uber boss Travis Kalanick. One of your self-driving Volvos in SF just ran a red light in front of the MOMA. You’re fuming. There was a human behind the wheel of that…

The Unintended – and Intended – Consequences of Cloud Data Sovereignty

By Allan Leinwand | March 9, 2017

Cloud Data Sovereignty It seems that everything has unintended consequences – whether positive or negative. Intended consequences are those that are chosen. Unintended consequences are forced upon us. The consequences surrounding data sovereignty regulations are no different. The adoption of…

POPULAR

A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

A Ray of Digital Sunshine Here’s something that will bring a smile: As hurricane Irma was about to slam into ...
Part 1 - Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even ...
4 Tech Cleanups For National Cyber Security Awareness

4 Tech Cleanups For National Cyber Security Awareness

National Cyber Security Awareness October is Cyber Security Awareness Month, and President Obama recently called upon the American people to ...
The Security of Cloud-Based Software and Client Communication

The Security of Cloud-Based Software and Client Communication

Cloud-Based Software Security The fear of not having a secure cloud-based software should far outweigh the fear of switching to a ...
Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! Move over chatbots - it is time for the empathetic bot. Say ...
Cloud Proofing Future Business Challenges

Cloud Proofing Future Business Challenges

Coping with Cloud Challenges Hardly a week goes by without coming across news around the increase in the number of ...
Connecting the Power of IoT

Connecting the Power of IoT

Connection Power I come not to bury Caesar. Nor do I come to bury his estimates. Estimates, attempts based on ...
Part 2 - Connected Vehicles: Paving the Way for IoT on Wheels

Part 2 – Connected Vehicles: Paving the Way for IoT on Wheels

Connected Vehicles: IoT on Wheels As vehicles become the hottest “thing” in IoT, the automotive, heavy equipment, and machinery industries ...

NEWSLETTER SUBSCRIBE

CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to recieve our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Excluisve promotions and our popular Comic series.

JOIN US

Something went wrong. Please check your entries and try again.