Disaster Recovery Planning Should Be Non-negotiable For Every Business

By Jeremy Daniel | May 31, 2017

Disaster Recovery Planning In today’s competitive business environment, being unable to service your customers needs can spell the end of your business. Customers in a different city, or even a different country, may not know or understand that a flood,

malware tracking maps

Live Hacking and Ransomware Tracking Maps Online

By CloudTweaks | May 14, 2017

Hacking and Ransomware Tracking Maps We’ve recently covered a few live hacking maps but have decided to extend the list based on the recent ransomware activities with some additional Hacking and Ransomware Tracking Maps. Ransomware refers to malicious software that blocks access

35% Increase in Global Attack Volumes, Reveals ThreatMetrix Report

By CloudBuzz | May 4, 2017

US Emerges as Primary Target for Cybercrime Attacks Data reveals 50 percent more cybercrime attacks originating from all of Europe than US, the single most-attacked nation, and increasing attacks from developing countries SAN JOSE, CA–(Marketwired – May 04, 2017) –

Key statistics from BakerHostetler’s 2017 Data Security Incident Response Report:

By CloudBuzz | April 19, 2017

BakerHostetler’s 2017 Data Security Incident Response Report NEW YORK, April 19, 2017 /PRNewswire/ — The BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the

Threat Hunters Strike Back: Results of SANS Survey Release

By CloudBuzz | April 17, 2017

SANS Survey Release Hunting still maturing and mostly ad-hoc, but those who hunt report improvements in security and response BETHESDA, Md., April 17, 2017 /PRNewswire-USNewswire/ — Threat hunting is becoming an integral part of defensive activities in larger enterprises or

Akamai Security Intelligence Response Team Identifies New Reflection Attack Method

By CloudBuzz | April 12, 2017

CLDAP Reflection Attacks Generate up to 24 Gbps of Traffic; Target Software and Technology Industry; Largest Concentration in U.S. CAMBRIDGE, Mass., April 12, 2017 /PRNewswire/ — Akamai Technologies, Inc. (NASDAQ: AKAM), the global leader in content delivery network (CDN) services,

Cloud Communications Security: Whose Business Is It, Anyway?

By Myk Konrad | April 11, 2017

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has arrived as a mainstream technology, with one prominent analyst firm (IDC) going so far as to call 2017 “the year

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

By Todd O’Boyle | April 4, 2017

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can enjoy a coffee-café latte in one hand and click “send” with the other is made possible by the explosion of

Disaster Recovery Strategies for Cloud Network Outages

By Jennifer Klostermann | April 3, 2017

Disaster Recovery Strategies Today, many organizations rely on the cloud for database and application services, a safe, cost-effective, and operationally advantageous strategy. However, when a widespread network outage hits, the necessary recovery mechanisms aren’t always in place. According to a

4 Tips for Secure Video Conferencing

By Vineet Misra | March 30, 2017

Securing Video Conferencing Today, cybersecurity dominates headlines as businesses of all sizes and across multiple industries are falling victim to data breaches and distributed denial of service (DDOS) attacks. Yet unified communications technologies have gained less attention in the security

SECURITY

Are You Thinking of Going to the Cloud Because of FOMO? Don’t!

Are You Thinking of Going to the Cloud Because of FOMO? Don’t!

The Fear of Missing Out A new study says FOMO – “Fear of Missing Out” is the reason cited by ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
The Cure for Cloud Sprawl: Nimble Operationalization in the Multi-Cloud

The Cure for Cloud Sprawl: Nimble Operationalization in the Multi-Cloud

The Cure for Cloud Sprawl Enterprises are shifting to a cloud-first footing. That’s no secret. But just as companies and ...
Countdown to GDPR: Preparing for Global Data Privacy Reform

Countdown to GDPR: Preparing for Global Data Privacy Reform

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European ...
Data Breaches: Incident Response Planning - Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning - Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last ...
Server-less Computing Necessitates A Significant Mind Shift

Server-less Computing Necessitates A Significant Mind Shift

Server-less is More The author of the Pied Piper of Hamelin, Robert Browning, is one of my favorite English poets ...
Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of ...
3 Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

3 Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, ...
Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, ...
Critical Success Factors when shifting Workloads into the Cloud

Critical Success Factors when shifting Workloads into the Cloud

Shifting Workloads into the Cloud By 2020, 92 percent of all workloads will reside in the cloud. Yet challenges remain ...