Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Security

4 Ways To Improve Cloud Security

By CloudTweaks | October 9, 2013

4 Ways Of Improve Cloud Security As cloud computing increases in popularity there is a surefire need to ensure that the business data available is always safe and secure. Those wishing to access the system could cause untold misery if allowed…

Cloud Infographic: State Of Application Security

By CloudTweaks | October 8, 2013

Cloud Infographic: State Of Application Security Excellent infographic provided courtesy of Quotium which views a number of major concerns based on the perspective of the the security manager. Infographic Source: Quotium

What Do IT Managers Place As Top Priority When Thinking Cloud? Service!

By Steve Prentice | October 8, 2013

What Do IT Managers Place as Top Priority when thinking Cloud? Service! IT managers have a great deal to think about when considering or overseeing their company’s transition to the cloud, since this is a technology that positions itself both…

Cloud Startup: Dropplets – Refreshingly Simple!

By CloudTweaks | October 7, 2013

Cloud Startup: Dropplets – Refreshingly Simple! Dropplets is all the rage in the blogging world today with its seamless blogging layout, hassle-free of any database background.  Seriously, the blogging world is tweeting about it and spreading the news. Dropplets even made…

Victim Of Cloud-Washing? Use VPCs To Compete With The Big Firms

By CloudTweaks | October 7, 2013

Victim of Cloud-Washing? Use VPCs to Compete with the Big Firms As Amazon continues to innovate and deliver new services at an incredible pace it can be a challenge for others in the Cloud Service Provider (CSP) market to keep…

How Did The Cloud Transform The World Of Change Management?

By CloudTweaks | October 4, 2013

How did the Cloud Transform the World of Change Management? Change management is extremely important for organizations embracing and deciding to go through with all kinds of technology initiatives. However, since much of the focus on cloud services over the…

Cloud Infographic: 5 New Technologies To Manage A Zombie Apocalypse

By CloudTweaks | October 3, 2013

Cloud Infographic: 5 New Technologies To Manage A Zombie Apocalypse With much discussion regarding cloud security, downtime, privacy and a number of other areas. We feel that this uniquely flippant infographic plays right into the theme of prudence meets paranoia…

Cloud Computing: Business Continuity vs. Disastrous Events

By CloudTweaks | October 1, 2013

Cloud Computing: Business Continuity vs. Disastrous Events Bad weather can cost companies money. It is an unfortunate lesson to learn the hard way, but natural disasters like hurricanes, floods or super storms are dramatic examples of the value of cloud…

Cloud Infographic: The Future Of The Cloud

By CloudTweaks | October 1, 2013

Cloud Infographic: The Future Of The Cloud Nice infographic provided courtesy of CWCS.co.uk which predicts that two-thirds of all workloads will be processed in the cloud by 2016. Infographic Source: www.CWCS.co.uk

The Next Wave Of Cloud Computing

By CloudTweaks | September 30, 2013

Next Tech Wave Cloud adoption at the enterprise level requires that cloud vendors deliver on enterprise-class reliability, security, and management.  While service levels for cloud computing are competitive with most companies’ on-premise datacenters, concerns about security will drive enterprise-scale organizations…

POPULAR

73% Are Using Internet Of Things Data To Improve Their Business

73% Are Using Internet Of Things Data To Improve Their Business

Internet Of Things Data According to the Cisco Visual Networking Index, M2M connections will represent 46% of connected devices by ...
Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...
Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT It’s obvious that IoT can make the entire healthcare industry more efficient. The kind of data involved can ...
Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where ...
Cloud Architecture

Cloud Architecture – The Multi-Tenant Versus Multi-Instance Debate

Cloud Architecture Winston Churchill quotes, “We shape our buildings; thereafter they shape us”. We can truly extend this analogy to ...
Critical Success Factors when shifting Workloads into the Cloud

Critical Success Factors when shifting Workloads into the Cloud

Shifting Workloads into the Cloud By 2020, 92 percent of all workloads will reside in the cloud. Yet challenges remain ...
Data as a Service

Data as a Service: 5 Strategies to Transition How You Access Data

Data as a Service Information wants to be free — at least that’s the saying. And like any good saying, ...