Leading Archives

Rich Campagna

Podcast #2: Trains, Security and AI

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using AI and news about Bitcoin ...
Lock

Are You Doing Enough To Protect Your Business From Ransomware? Probably Not

Protect Your Business From Ransomware Ransomware is more advanced than ever. If you aren’t updating your security with that in mind, you’re in trouble. Here’s ...
Sarah Patrick

3 Considerations To Help Businesses Navigate Cloud Implementation

Cloud Implementation Cloud computing technology has improved significantly in the past year, making it an appealing tool for businesses of all sizes. Cloud computing can ...
Home Iot

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting ...
Sam Bowman

Medical Data Online: What Are the Risks?

Medical Data in the Cloud Executive-level healthcare leaders must have a thorough understanding of cloud-based security risks. Patient data can vary from simple information such ...
Comic Att

SECURITY RESOURCE HUB

Elevating tech security to new heights!

Cloud security news, resources, thought leadership and infographics covering topics such DDoS, Ransomware, Privacy Breaches, cybersecurity certification and more...

THOUGHT LEADERSHIP

Kamal Maggon

Mining Business Value – Accelerating a US Company’s Cloud Transformation

By Kamal Maggon | June 22, 2021

Mining Business Value Traditional industries like mining have been slow to adapt to changing IP technology.  Of course, coal and other mining types have adopted new technologies starting with mechanical drills powered by pistons, then compressed air in the Industrial

Martin Mendelsohn

Of Rogues, Fear and Chicanery: The Colonial Pipeline Dilemma and CISO/CSO Priorities

By Martin Mendelsohn | June 10, 2021

The Colonial Pipeline Dilemma The Colonial Pipeline is one of a number of essential energy and infrastructure assets that have been recently targeted by the global ransomware group DarkSide, and other aspiring non-state actors, with access to the latest technology,

Internet Security

Firefox introduces Enhanced Tracking Protection for Desktop Users

By Gary Bernstein | June 8, 2021

Firefox introduces Enhanced Tracking Protection for Desktop Users Great news for Mozilla Firefox users as the internet browser rolled out its latest tracking protection features that make web surfing a lot safer. The new Enhanced Tracking Protection will automatically shield

Calculation Real Costs

The Importance of Intelligent Monitoring & Detecting Unexpected Cloud Usage

By Josh Hamilton | June 4, 2021

The Importance of Intelligent Monitoring Most people have experienced sticker shock at one time or another. Eyes tend to bulge when they scan down to the bottom line of an itemized hospital bill! Similarly, CIOs know that cloud-usage-bill shock is

Gary Taylor

Addressing 5 Key Risks for the Hybrid Worker

By Gary Taylor | May 20, 2021

Hybrid Worker Risks Organizations are under pressure to secure their remote workers, but they are also worried about the potential impact on user experience. Can they have it both ways without compromise? The pandemic has forced organizations to alter their