Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Cloud Computing

Cloud-surfing Can Pay Big Dividends For Your Business

By CloudTweaks | February 8, 2013

Cloud-surfing can pay big dividends for your business through lower costs and enhanced service In the never-ending search for competitive advantage, Cloud-based services like a Hosted PBX business telephone system can offer business owners and managers new opportunities for cost…

Capgemini And EMC Extend Global Strategic Alliance

By CloudTweaks | February 7, 2013

Capgemini And EMC Extend Global Strategic Alliance To Enable Brazilian Businesses with Next-Generation Cloud Solutions   PARIS, FRANCE, SAO PAULO, BRAZIL, HOPKINTON, Mass. – February 7, 2013 Capgemini, one of the world’s foremost providers of consulting, technology, and outsourcing services, and…

Cloud Computing And Thin Clients

By Pete Knight | February 7, 2013

Cloud Computing and Thin Clients When I began looking at thin client applications, I was pretty darned sure that the weight loss industry had come up with yet another way to separate overweight people from their money. Introducing Thin Technology…

Whitepaper: The Journey To Private Cloud

By CloudTweaks | February 6, 2013

The Journey to Private Cloud Based on a recent Enterprise Management Associates® (EMA™) research study, the main reasons for adopting cloud computing, mentioned by 52%-62% of respondents, were as follows: a) Agility: Accelerating service creation and provisioning b) Performance and…

Tips In Choosing Disaster Recovery Solutions

By CloudTweaks | February 6, 2013

Tips In Choosing Disaster Recovery Solutions Remember the story of the legendary passenger ship the Titanic? It was said to be unsinkable and yet on its first voyage in April of 1912, it sank to the bottom of the North…

Information Collection: Business Builds Big Data

By Pete Knight | February 6, 2013

Information Collection: Business Builds Big Data In the beginning there was the electronic computer. It was a tool for defending freedom, useful to use in breaking enemy communications codes and crunching equations for the Manhattan Project. Eventually it became the…

Coca-Cola Bottling Company Quenches Its Thirst For Spend Optimization With Coupa

By CloudTweaks | February 5, 2013

Coca-Cola Bottling Company Quenches Its Thirst For Spend Optimization With Coupa Coupa Brings Mobility and Unparalleled Adoption to Hundreds of Users SAN MATEO, Calif. – February 5, 2013 – Coupa Software, the leader of cloud-based spend optimization solutions, today announced that…

Cloud Infographic: Hidden Costs Of The Cloud

By CloudTweaks | February 5, 2013

Cloud Infographic: Avoiding The Hidden Costs Of The Cloud Source: Symantec

Smooth BPM The Silver Lining Of Cloud Computing

By CloudTweaks | February 5, 2013

Smooth BPM The Silver Lining Of Cloud Computing Businesses rely on the implementation of processes. Cloud-based software provides a way for easy management and alleviates issues companies face trying to improve these processes, particularly when it comes to prototyping and…

PBX Technology

What Is Public Branch Exchange or PBX Technology

By CloudTweaks | February 5, 2013

PBX Technology Cloud technology is showing up everywhere as the best and most efficient means of data storage. If you’re a cloud technology enthusiast, you can now use a cloud system for your phone system, too. Cloud (or virtual) PBXs…

POPULAR

How B2B Ecosystems & (Big) Data Can Transform Sales and Marketing Practices

How B2B Ecosystems & (Big) Data Can Transform Sales and Marketing Practices

B2B Ecosystems & (Big) Data Managing your relationships with customers, suppliers, and partners and constantly improving their experience is a ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
RSA Conference: FUD-free or filled?

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021 At the annual RSA conference, there were plenty of discussions and presentations on the ...
Cross-Site Scripting - Why Is It A Serious Security Threat For Big Data Applications?

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading ...
Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where ...
Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience - it's a lot like running a triathlon and ...
IoT, Smart Cities and the Future

IoT, Smart Cities and the Future

Smarter IoT When we use the term smart cities, a series of frames begin to run in front of our ...
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing ...