Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Cloud Computing

The Cloud In 2015: Eight Trends To Look For

By Vidya Phalke | January 6, 2015

The Cloud In 2015 For organizations of all sizes, in 2014 the cloud emerged as a critical part of the default consideration set when implementing any new application – in large part due to the cloud’s proven ability to handle…

How Docker Changes Cloud Security?

By CloudTweaks | January 6, 2015

Docker cloud security Nowadays Cloud computing is thriving on its popularity as benefits of cloud adoption are countless, including better efficiency, reduced costs of virtual services, greater accessibility and flexibility. Today almost everything that includes information of individuals and companies…

Cloud Infographic – IoT and Smart Functions

By CloudTweaks | January 5, 2015

Smart Functions In 2015 Smartwear, Wearable technology, Internet of Things are all big topics of discussion and on many investors radar for areas to look into in 2015 and beyond.  Gartner and IDC estimate that between $300 Billion (Product and service…

Is Bigger Better? Not with the Cloud on Your Side

By Marc Malizia | January 5, 2015

Is Bigger Better? Growing up, bigger almost always equated to better. The bigger kid hit the baseball farther, threw the ball faster, shot the hockey puck harder and usually won the fight. In school, we were taught that larger companies…

The Lighter Side Of The Cloud – Resolutions

By Al Johnson | January 2, 2015

By Al Johnson Please feel free to share our comics via social media. For questions regarding the licensing and commercial reuse for websites and print, please contact us for more information.

Logicalis Recognized as Cisco Application Centric Infrastructure Authorized Technology Provider in the U.S.

By CloudTweaks | December 30, 2014

NEW YORK, Dec. 30, 2014 /PRNewswire/ — Logicalis US, an international IT solutions and managed services provider (www.us.logicalis.com), announced today that it has achieved Application Centric Infrastructure (ACI) Authorized Technology Provider (ATP) designation from Cisco. The designation recognizes Logicalis as having…

Cloud, CMS and Security

By Glenn Blake | December 30, 2014

The Growing Interest for Security and CMS CMS services are allowing more people to run their own successful websites without needing to know HTML or any web programming languages. CMS, which stands for content management system, is software you install…

Cloud Infographic – SME’s Cloud Guide

By CloudTweaks | December 29, 2014

The SME’s Guide to Moving to the Cloud There is a fair bit of complex information out there which does not fully address the fundamental business reasons for moving to the cloud. Considering that 4 in 5 companies could potentially…

Artificial Intelligence And Deep Learning

By CloudBuzz | December 29, 2014

The most striking research results in AI came from the field of deep learning, which involves using crude simulated neurons to process data. Work in deep learning often focuses on images, which are easy for humans to understand but very…

When Algorithms Go Awry

By Lauris Veips | December 29, 2014

When Algorithms Go Awry Personalization is a very effective marketing tool–the most successful entrepreneurs use their data to great effect to segment their marketing efforts, with the best going as far as to segment down to the very individual (think…

POPULAR

3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Bob Waters

Artificial or Augmented Intelligence: Talks with Intel’s Chief Data Scientist, Bob Rogers

Artificial or Augmented Intelligence I recently sat down with Bob Rogers. Bob is Intel’s Chief Data Scientist for Analytics and ...
DELUSIONS OF ADEQUACY: WHY PRESIDENTIAL POLICY DIRECTIVE 41 FALLS SHORT

DELUSIONS OF ADEQUACY: WHY PRESIDENTIAL POLICY DIRECTIVE 41 FALLS SHORT

Delusions of Adequacy President Obama’s recent policy directive on cybersecurity was eight years in the making. Unfortunately, its proposed actions ...
The 800-Pound Cloud Gorilla Makes a Move

The 800-Pound Cloud Gorilla Makes a Move

Amazon Connect Oh-oh! First, books; then all of retail and cloud services. Now, call centers??? What is Amazon up to? ...
The Cloud Isn’t a Security Issue; It’s a Security Opportunity

The Cloud Isn’t a Security Issue; It’s a Security Opportunity

Security Issue In order to stay ahead in today’s competitive business landscape, companies need to constantly innovate. Development teams must ...
Key Takeaways From Dyn's DDoS Attack

Key Takeaways From Dyn’s DDoS Attack

DDoS Attack Takeaways  If you tried to access some of the world’s most popular websites, such as Twitter, Spotify, CNN, ...
A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

A Ray of Digital Sunshine During a Hurricane Portends Big Changes in One of the World’s Largest Industries

A Ray of Digital Sunshine Here’s something that will bring a smile: As hurricane Irma was about to slam into ...
Connecting the Power of IoT

Connecting the Power of IoT

Connection Power I come not to bury Caesar. Nor do I come to bury his estimates. Estimates, attempts based on ...