Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Interviews

Amazon Web Services Is A $5bn Business – What Next?

By Jonathan Keane | April 27, 2015

Amazon Web Services Amazon Web Services is now a $5bn business, according to Amazon’s quarterly earnings call last week, the first time that the company has disclosed detailed finances for Amazon Web Services, launched in 2006. (Image Source: Ken Wolter /…

Monetization of the Internet of Things – (Part 2)

By Daniel Price | November 26, 2014

Q&A With Brendan O’Brien, Co-Founder of Aria Systems Monetization of the internet of things (IoT) is one of the most exciting and challenging issues facing the industry today, so we spoke with Brendan O’Brien to learn more. This is the 2nd…

Monetization of the Internet of Things – Q&A With Brendan O’Brien

By Daniel Price | November 24, 2014

Q&A With Brendan O’Brien, Co-Founder of Aria Systems (Part 1) Monetization of the internet of things (IoT) is one of the most exciting and challenging issues facing the industry today, so we spoke with Brendan O’Brien to learn more. Brendan…

Latest Netskope Report: Security Nightmare For IT Departments

By Daniel Price | July 31, 2014

Latest Netskope Report: Security Nightmare For IT Departments Netskope have today released the findings of their quarterly ‘Cloud Report’. The report, which complies the foremost trends on cloud app adoption and usage, discovered the emergence of several new trends. Chief…

object based storage

The New Wave On The Cloud: Object Based Storage

By CloudBuzz | June 30, 2014

Object Based Storage Is your data exponentially growing? Are you using orthodox storage systems like Storage Area Network (SAN) and Network Attached Storage (NAS)? Cloud computing with its numerous benefits and innovative capabilities now offers a novel way of working…

How Cloud-Based Channel Management Is Automating Critical Business Processes

By Steve Prentice | May 22, 2014

Interview: How Cloud-Based Channel Management is Automating Critical Business Processes for Large Technology Manufacturers By Steve Prentice/CloudTweaks Recently, I spoke with Chandran Sankaran, Founder and CEO of Zyme Solutions in Redwood Shores, CA. Before Zyme, he was Chairman and CEO of Closedloop…

Moving ERP To The Cloud

By Steve Prentice | April 23, 2014

Moving ERP to the Cloud You can’t run a business without ERP. The term itself stands for Enterprise Resource Planning, but in essence ERP is about pulling together all the functions involved in a company into one computer or system.…

The Power Of Tagging In The Cloud

By Steve Prentice | April 4, 2014

The Power Of Tagging In The Cloud When people wish to identify friends and acquaintances on Facebook or in Twitter photos, they use a feature called tagging, which, as we all know, identifies the person by name and thus allows…

Federal Agencies Moving To The Cloud: Bellwether Report

By Steve Prentice | February 25, 2014

Federal Agencies moving to the Cloud: Bellwether report shares Feds’ progress and collective wisdom. In December 2010, the U.S. Government’s Chief Information Officer Vivek Kundra issued a 25 Point Implementation Plan to Reform Federal Information Technology Management, designed to streamline…

The Power Of Custom Metrics

By Steve Prentice | February 20, 2014

The Power of Custom Metrics Have you ever watched an auction? Whether people are seeking to buy fine art, cars or livestock, they will spend time at an auction house, in order to place their bids and hopefully snag a…

POPULAR

Four Tips For Better Information Security In The Cloud

Four Tips For Better Information Security In The Cloud

Information Security Businesses are increasingly relying on cloud based application deployments and are open to entrusting their most critical data ...
The Economy Just Limps Along. Guess Who’s to Blame?

The Economy Just Limps Along. Guess Who’s to Blame?

Productivity seems down the drain. Unemployment is at historic lows yet real wage growth is pathetic. Why? Hard to believe ...
Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...
Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
How IoT and OT collaborate to usher in the data-driven factory of the future

How IoT and OT collaborate to usher in the data-driven factory of the future

The Data-driven Factory The next BriefingsDirect Internet of Things (IoT) technology trends interview explores how innovation is impacting modern factories and supply chains ...
Disaster Recovery Planning Should Be Non-negotiable For Every Business

Disaster Recovery Planning Should Be Non-negotiable For Every Business

Disaster Recovery Planning In today’s competitive business environment, being unable to service your customers needs can spell the end of ...
Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines ...
Cross-Site Scripting - Why Is It A Serious Security Threat For Big Data Applications?

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading ...