Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Lists

Holiday Shopping For Drones? 5 Things You Need To First Know

By Jeremy Daniel | November 24, 2015

Holiday Shopping For Drones? FAA’s New Drone Registration Proposals The Christmas shopping season is upon us and the Federal Aviation Authority (FAA) is speculating that one of the hottest items for well-to-do shoppers will be drones. They are speculating that…

10 Potentially Obsolete Security Technologies

By CloudBuzz | August 17, 2015

Systemic flaws and a rapidly shifting threatscape spell doom for many of today’s trusted security technologies Perhaps nothing, not even the weather, changes as fast as computer technology. With that brisk pace of progress comes a grave responsibility: securing it.…

5 Tips For Getting Millennials Onboard Your SaaS

By SaaS Addict | July 29, 2015

Getting Millennials Onboard Your SaaS Why are Millennials the key demographic that SaaS companies should focus on? For one, they are quickly making up a larger share of your total user base. However, it is more than just a shift…

5 Steps To Effective Social Media Marketing

By Jennifer Klostermann | July 29, 2015

Push Your Cloud Startup Using  Social Media Marketing We’ve talked on a number of occasions about the Social media cloud as well as topics such as Social listening and would like to a bit about Marketing in the social cloud. Social media marketing…

5 Ways The Cloud Is Redefining Modern-Day Data Centers

By CloudTweaks | July 17, 2015

Modern-Day Data Centers Cloud computing is driving a major shift in the IT landscape. According to research firm IDC, the cloud has changed the fundamental nature of computing and the very way business is done and IT is provisioned. The…

Here Are Four Ways To Elevate IT

By Marc Malizia | April 15, 2015

Here Are Four Ways To Elevate IT Prior to joining the consulting side of the industry, I worked in corporate IT for the first 7-8 years of my career. While my time in corporate IT has long come to a…

From AOL To Twitch: A Decade Of Big Data Hacks

By CloudTweaks | March 26, 2015

A Decade Of Big Data Hacks The idea of hacking has been around forever. Popular in science-fiction films for decades, hacks have now become a reality for many people who engage in basic activities online. Here is a look at…

petter

Cloud Security Risks: The Top 8 According To ENISA

By Peter HJ van Eijk | March 24, 2015

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the…

12 Inspirational Stories of Animals Using Technology

By Daniel Price | March 10, 2015

12 Inspirational Stories of Animals Using Technology  Pets bring so much joy to humans. Whether you’re a dog person, a cat person, or a hamster person, there is nothing better than taking time out of a hectic schedule to relax…

The Cloud In 2015: Eight Trends To Look For

By Vidya Phalke | January 6, 2015

The Cloud In 2015 For organizations of all sizes, in 2014 the cloud emerged as a critical part of the default consideration set when implementing any new application – in large part due to the cloud’s proven ability to handle…

POPULAR

Cloud’s Mighty Role - Why Custom Development is the Next Big Thing (Again)

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes ...
Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend ...
Driving Transformation? It is possible to predict the future.

Driving Transformation? It is possible to predict the future.

Driving Transformation Previously, I wrote about the criticality of defining the Vision for your transformation - what is your real objective, how ...
WordPress Security 101 – Protecting Against Insider Threats

WordPress Security 101 – Protecting Against Insider Threats

Protecting Against Insider Threats Continued from part 1 of our 5 part Wordpress security series. A recent Breach Level Index report by ...
Reduce Digital Printing Costs

3 Ways To Reduce Digital Printing Costs

Reduce Digital Printing Costs For many organizations, office printing is one of the top expense categories — yet many companies ...
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” ...
Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines ...
What Does The Transition To New Energy Teach Us About Cloud?

What Does The Transition To New Energy Teach Us About Cloud?

New Energy Shift CIOs report that private cloud is all the rage now. The Cisco’s of the world argue that ...