Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Contributors

The FANGs Dominate the S&P 500. The Average Membership Tenure is Shrinking

By John Pientka | October 20, 2017

What is Going to Knock Them Off the List? The FANGs (acronym for Facebook, Amazon, Netflix and Google) ride high today. But, creative destruction is relentless. They are no less impervious to disruption than earlier companies. What do you think…

Data Visualization 101: How, What, Why?

By Cloud Syndicate | October 19, 2017

Data Visualization 101 “A picture is worth a thousand words.” This old, English idiom could not ring more true than in today’s fast-paced, digital age – the big data age. At a time when we are creating 2.5 quintillion bytes…

Beth Desmond

When Innovation Ignites – The Promise of Cloud

By Cloud Syndicate | October 19, 2017

When Innovation Ignites “I am tired of hearing about how Cloud will allow customer personalization — I want to feel it!” I said to IBM Cloud expert Sanjay Rishi. Here’s how he answered. “Imagine you are a large equipment company, serving both…

Are You Doing Enough To Protect Your Business From Ransomware? Probably Not

By Cloud Syndicate | October 19, 2017

Protect Your Business From Ransomware Ransomware is more advanced than ever. If you aren’t updating your security with that in mind, you’re in trouble. Here’s why. $6 million as ZDNet reports. “Researchers at Carbon Black monitored dark web forums for offerings…

Evan Golly

Organizational Transformation: Taking The DevOps Dive

By Cloud Syndicate | October 18, 2017

Taking The DevOps Dive The Gartner IT Glossary defines DevOps as “…a change in IT culture, focusing on rapid IT service delivery through the adoption of agile, lean practices in the context of a system-oriented approach. DevOps emphasizes people (and culture), and…

WordPress Security 101 – Protecting Against Insider Threats

By CloudTweaks | October 18, 2017

Protecting Against Insider Threats Continued from part 1 of our 5 part WordPress security series. A recent Breach Level Index report by Gemalto, a global cyber security solutions provider, is titled “Poor Internal Security Practices Take A Toll” for a reason. The…

The Role of AI in Assisting Customer Experience

By Ronald van Loon | October 18, 2017

Assisting Customer Experience From being the plots of sci-fi thrillers to being seen as threats by the working populace, Artificial Intelligence (AI) has during the last few years jumped into the headlines as it has become a part of reality.…

Cloud Computing, AI and The Future of Language Translation

By John Pientka | October 17, 2017

The Tower of Babel Is Over Imagine: you are in a conference room with colleagues from China, Japan, Germany and Egypt. You each speak in your native tongue and the other participants hear it in their native tongue. Humans have…

The Path Of Cloud Computing Is Paved With Collaboration

By Kayla Matthews | October 17, 2017

Cloud Computing Collaboration Cloud computing ushers in a new age of collaboration, one that allows an organization to excel at sharing data and strategies seamlessly and securely. Cloud-based collaboration has grown businesses at various levels, from employees collaborating within a single…

The Future Impact of Drone Technology

By Scott Andersen | October 16, 2017

Impact of Drone Technology I spend a lot of time thinking about the impact of drones. Not the impact that occurs when you crash your drone. I have done that twice now, and frankly, it is painful and expensive. Every…

POPULAR

Part 1 - How Cloud Apps Are Making Businesses More (and Less) Secure

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can ...
Coping with the Internet of (Risky) Things

Coping with the Internet of (Risky) Things

Internet of (Risky) Things The train appears to have left the station, and device manufacturers – makers of everything from ...
Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! And do you even care?

Are you being served by an empathetic Bot! Move over chatbots - it is time for the empathetic bot. Say ...
AI

These U.S. Counties Are The Best At Using AI For Their Citizens

AI For Their Citizens Every year, the Center for Digital Government conducts a survey of every county in the U.S ...
Numeraire Cryptocurrency

Numeraire Cryptocurrency Goes Live

Numeraire cryptocurrency Numerai, a hedge fund started in late 2015 by mathematician Richard Craib. The new Numerai cryptocurrency comprises digital ...
Zero-Rating and Data Consumption

Zero-Rating and Data Consumption

Zero-Rating The ordinary mobile user often feels the need to backup their personal files only after they’ve lost it. It’s ...
PODCAST - EPISODE 2: Trains, Security and AI

PODCAST – EPISODE 2: Trains, Security and AI

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using ...
Using Cloud Analytics To Improve Customer Experience

Using Cloud Analytics To Improve Customer Experience

Evolution of Cloud Analytics Moving data to the cloud, once considered a strenuous task, has now become commonplace in most ...