Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Cloud Computing

SndrBlock Is A New Device For Secure Cloud Communication

By CloudBuzz | January 30, 2017

SndrBlock The market obviously needs more secure communications and safe devices to harness the cloud for encrypted messaging. The Proton encrypted email service relaunched last week; now, Sndr is launching a crowdfunding campaign to fund development of a palm device…

Future of Banking Part 2: Social Payments On The Rise

By Josh Hamilton | January 30, 2017

Social Payments In 2014, RBC became the very first bank in North America to offer a P2P payment service via Facebook Messenger. In the two years since then social payments have been on a steady rise, and while they have…

Scale Matters in the Enterprise Cloud

By Allan Leinwand | January 30, 2017

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly understood technology. At the most basic level, consumers see the cloud as a place where their photos are backed up…

Expect Cloud Companies To Enter Content Distribution Industry Through The IoT Market

By CloudTweaks | January 27, 2017

Cloud Content Distribution Industry The Internet of Things is gradually becoming a real thing despite some doubts about the maturity of the technology and constant concerns over the privacy and security provided by IoT devices that customers use at home…

PBX Technology

Moving Your Phone System To The Cloud And Empowering Your Mobile Workforce

By Jennifer Klostermann | January 27, 2017

Moving your phone system to the cloud The cloud is already providing businesses with such a range of advanced tools and services, optimizing communication across channels, improving global cooperation, and supporting collaboration between teammates and partners both on and off…

The Lighter Side Of The Cloud – Old School Cleanup

By Christian Mirra | January 27, 2017

Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated. By Christian Mirra

Big Money in IoT Acquisitions – Trend Set to Continue

By Josh Hamilton | January 26, 2017

IoT Acquisition Trends IoT (Internet of Things) was one of the hottest markets of 2016, with money being poured into acquisitions as companies look to grow their share of this rapidly expanding market. With more and more companies become reliant on…

How Printers Help Hackers Hide In Plain Sight

By Steve Prentice | January 26, 2017

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the table across from you in the coffee shop – the one who happens to be…

101 on Service Integration and Management (SIAM)

By Sheetal Kale | January 26, 2017

Service Integration and Management Enterprise IT architecture has evolved from the earlier monolithic, single supplier model to a best-of-breed approach in order to address IT needs of specific business services. The struggle for enterprises is that, as they consume IT…

Trends in MarTech to Look Out for This Year

By Joya Scarlata | January 26, 2017

Trends in MarTech Marketing technology, or MarTech, has come a long way with a landscape that is steadily growing. In 2016, the MarTech landscape has nearly doubled in size, with no signs of stopping. The number of vendors entering the…

POPULAR

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive ...
3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to ...
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all ...
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” ...
Metal Detecting Drone

The Rise Of The Metal Detecting Drone

Metal Detecting Drone Look up in the sky; it's a bird, no it's a plane. No, it is a swarm ...
The Path Of Cloud Computing Is Paved With Collaboration

The Path Of Cloud Computing Is Paved With Collaboration

Cloud Computing Collaboration Cloud computing ushers in a new age of collaboration, one that allows an organization to excel at ...
The Paradigm Shift In Enterprise IT Operations Management

The Paradigm Shift In Enterprise IT Operations Management

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology ...
malware tracking maps

Live Hacking and Ransomware Tracking Maps Online

Hacking and Ransomware Tracking Maps We've recently covered a few live hacking maps but have decided to extend the list ...