DDoS

Raytheon enhances cyber threat hunting with CyberSponse automation tools

By CloudBuzz | July 25, 2017

New capability unveiled at Black Hat cybersecurity conference LAS VEGAS, July 25, 2017 /PRNewswire/ — Raytheon Company will integrate the CyberSponse security platform to automate threat detection and response for its managed services customers. This technology collaboration combines CyberSponse’s automated incident response

Turn to the Cloud as Part of Your Data Breach Strategy

By Daren Glenister | June 13, 2017

Data Breach Strategy The latest Verizon Data Breach Investigations Report is out, and the verdict is in: data breaches are on the rise. While the news shouldn’t surprise anyone, there are some actionable insights to help improve cybersecurity organizational approaches

Has Cybersecurity Become Too Reactive in this Day and Age?

By Josh Hamilton | June 6, 2017

Cybersecurity Too Reactive? Cybersecurity today has become far too reactive. The constant innovation of hackers has meant that defenses are made up of a patchwork of web application firewalls, end-point protection, data-loss protection, and more. This can lead to a

disaster recovery solutions

Disaster Recovery Planning Should Be Non-negotiable For Every Business

By Jeremy Daniel | May 31, 2017

Disaster Recovery Planning In today’s competitive business environment, being unable to service your customers needs can spell the end of your business. Customers in a different city, or even a different country, may not know or understand that a flood,

malware tracking maps

Live Hacking and Ransomware Tracking Maps Online

By CloudTweaks | May 14, 2017

Hacking and Ransomware Tracking Maps We’ve recently covered a few live hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious

35% Increase in Global Attack Volumes, Reveals ThreatMetrix Report

By CloudBuzz | May 4, 2017

US Emerges as Primary Target for Cybercrime Attacks Data reveals 50 percent more cybercrime attacks originating from all of Europe than US, the single most-attacked nation, and increasing attacks from developing countries SAN JOSE, CA–(Marketwired – May 04, 2017) –

Key statistics from BakerHostetler’s 2017 Data Security Incident Response Report:

By CloudBuzz | April 19, 2017

BakerHostetler’s 2017 Data Security Incident Response Report NEW YORK, April 19, 2017 /PRNewswire/ — The BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the

Threat Hunters Strike Back: Results of SANS Survey Release

By CloudBuzz | April 17, 2017

SANS Survey Release Hunting still maturing and mostly ad-hoc, but those who hunt report improvements in security and response BETHESDA, Md., April 17, 2017 /PRNewswire-USNewswire/ — Threat hunting is becoming an integral part of defensive activities in larger enterprises or

Cloud Communications Security: Whose Business Is It, Anyway?

By Myk Konrad | April 11, 2017

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has arrived as a mainstream technology, with one prominent analyst firm (IDC) going so far as to call 2017 “the year

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

By Todd O’Boyle | April 4, 2017

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can enjoy a coffee-café latte in one hand and click “send” with the other is made possible by the explosion of

THOUGHT LEADERSHIP ARCHIVE

Cloudy Apps: New Challenges And Complexities

By Alex Heneveld

Cloudy Apps New technologies often simplify some aspect of life, an aspect which was previously painful. But then, as soon as it is adopted, a technology presents new challenges and new complexities. With cloud computing, you can get a new

Protect Against Network Failures

Five Things Organizations Can Do To Protect Against Network Failures

By Milind Kulkarni

Protect Against Network Failures It is no surprise that whenever there is an outage in a public or private cloud, organizations lose business, face the wrath of angry customers and take a hit on their brands. The effects of an

Storage Stalemate: Why Current Trends Are Breaking Old Storage Solutions

By CloudTweaks

Old Storage Solutions While new technologies are being adapted at lightening pace across all kinds of industries, one thing has not changed: IT departments are expected to use antiquated storage solutions to meet their new storage needs. Just as we

5 Things To Consider About Your Next Enterprise Sharing Solution

By Rajesh Ram

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction

Four Recurring Revenue Imperatives

By Tom Dibble

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology

Stuck In The Clouds: The Issue Of Data Ownership

By Bob Greenlees

The Issue Of Data Ownership While the immediate benefits of cloud services are typically clear to new users, individuals and businesses alike are becoming increasingly aware of a looming issue: vendor lock-in. As these users amass large amounts of data in

The Paradox of Colocation Solutions

By Michael Hollander

Colocation Solutions According to Aberdeen Group and Ventana Research, one out of four enterprises surveyed expect their data to grow by more than 30 percent in the next year. In order to cope with the explosive increase in data, we

Public Clouds Have Internal IT Beat For New Projects

By CloudTweaks

Renting IT Resources For departments in organizations that need to get an application deployed, the fastest and most effective option is renting IT resources on a public cloud such as Amazon Web Services (AWS), rather than working with the internal

Cloud Native Trends Picking Up – Legacy Security Losing Ground

By Chenxi Wang

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in

Salesforce Gets Serious About Its Security Ecosystem

By Harold Byun

Security Ecosystem Salesforce is one of the fastest growing enterprise software companies in history and while security is a major roadblock for many cloud projects, the company’s extensive security investments appear to be paying off. Salesforce is one of just

Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience - it's a lot like running a triathlon and ...
RSA Conference: FUD-free or filled?

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021 At the annual RSA conference, there were plenty of discussions and presentations on the ...
Advanced IoT systems provide analysis catalyst for the petrochemical refinery of the future

Advanced IoT systems provide analysis catalyst for the petrochemical refinery of the future

Advanced IoT Systems The next BriefingsDirect Voice of the Customer Internet-of-Things (IoT) technology trends interview explores how IT combines with IoT to help ...
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords Simple passwords are no longer safe to use online. John Barco, vice president of Global ...
Cloud Services Providers - Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from ...