Security

Smartphone PIN protection methods have high failure rate

By CloudBuzz | June 8, 2018

FRIDAY, JUNE 8, 2018 – Popular methods of protecting smartphone personal identification number (PINs) may only be successful in safeguarding your personal information 20 per cent of the time, according to a new study out of the University of Waterloo.

Survey: Millennials Don’t See Career Path in Cybersecurity

By CloudBuzz | June 7, 2018

As organizations struggle to fill cybersecurity vacancies, they aren’t finding many candidates among millennial jobseekers. A new study shows millennials are only marginally interested in cybersecurity careers, with 9 percent showing any interest at all. The finding is troubling, considering millennials have

malware tracking maps

May’s Most Wanted Malware: Cryptomining Malware Digs into Nearly 40% of Organizations Globally

By CloudTweaks | June 7, 2018

Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018 SAN CARLOS, Calif., June 07, 2018 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ:CHKP), a leading provider of cyber-security solutions

Hacking ‘hero’ Marcus Hutchins faces more malware charges

By CloudBuzz | June 7, 2018

A British cyber-security researcher credited with stopping the spread of the WannaCry virus faces four more charges related to separate malware he is alleged to have created. Marcus Hutchins, who denies the charges, has asked his Twitter followers to help

Lawmakers press Facebook over Chinese data sharing

By CloudBuzz | June 6, 2018

WASHINGTON (Reuters) – Two key U.S. lawmakers on Wednesday rebuked Facebook Inc for not being more transparent over its data sharing after the social media company said it had collaborated with at least four Chinese companies, including a smartphone maker

7 GDPR readiness success stories to inspire any company

By CloudBuzz | June 6, 2018

In a series of blog posts, IBM is offering coaching to get businesses into shape so they can thrive in the new data era. For some time now, IBM has been working with customers as they work towards GDPR compliance, tackling

How to Transform Your Operating Model for the Cloud

By Jeff Townes | June 4, 2018

Transform Your Operating Model It can be tough for established organizations to embrace change, so when they start working with cloud-based technology, they’re bound to encounter hurdles. While some companies transform themselves, others lag behind. So what gives? In truth, it’s

Announcing General Availability of SAP Data Custodian for Companies Using Google Cloud Platform

By CloudBuzz | June 1, 2018

We are excited to announce the general availability of SAP Data Custodian for companies using Google Cloud Platform. With this release, SAP offers unparalleled levels of data visibility and control for companies to help protect their data. SAP Data Custodian

How to Protect Financial Institutions From DDoS Attacks

By CloudBuzz | May 30, 2018

Financial institutions have always been the targets of criminals, forcing them to implement complex and sophisticated security measures against attacks. The digital frontier only provided new fertile ground for increasingly creative cyber criminals and forces banks to evolve their own

Infosec thought leaders

Why you should add a connection broker to your suite of DevOps tools

By Karen Gondoly | May 30, 2018

DevOps Connection Broker When staring down the DevOps path, you have no lack of tools to help you pave the way. But there’s one you’ve probably never thought of, maybe even never heard of, and it’s time to expand your

THOUGHT LEADERSHIP ARCHIVE

IT Transformation Journey

Self Discovery and the IT Transformation Journey

By Kevin Gruneisen

IT Transformation Journey At its most basic level, travelling along the IT transformation journey from conventional data centers to the dynamic, intelligent environments of cloud computing is an adventure in self discovery that has a way of changing you as

Bridging The Chasm Between Business And IT – The GRC Way

By Rajesh Raman

Business And IT  In today’s world, company operations function at two distinct levels: the business operation level and the IT infrastructure operation level. While the two functions operate independently, IT exists to support the business. Many of the IT operations,

Salesforce Gets Serious About Its Security Ecosystem

By Harold Byun

Security Ecosystem Salesforce is one of the fastest growing enterprise software companies in history and while security is a major roadblock for many cloud projects, the company’s extensive security investments appear to be paying off. Salesforce is one of just

Cloud Access Management: Access Everywhere

By Dean Wiech

Cloud Access Management As the utilization of cloud applications has become a standard of using in nearly every industry, there needs to be solutions available to help manage these applications. One way for admins to effectively manage their organization’s applications

Mitigating the Downtime Risks of Virtualization

By Paul Mercina

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean angry communications from employees and the C-suite and often a Twitterstorm of customer ire. See the recent Samsung SmartThings dustup

Imminent IoT Eye-Tracking Technologies To Transform The Connected World

By CloudTweaks

IoT Eye Tracking Smelling may be the first of the perceptible senses, but the eye is the fastest moving organ in the human body. While the first, second, and third screens have historically exercised the potential of this organ to

Cloud Based Service Level Agreements – Two Different Worlds

By CloudTweaks

Cloud Service Level Agreements A common theme in the chatter about cloud computing is the need for Cloud Based Service Level Agreements SLAs around performance and availability. These SLAs simply don’t exist or are specified in a way that makes them

Mark Carrizosa

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

By CloudTweaks

Record Breaches Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its

Online File Sharing And The Importance Of Security

By Charles Mount

Online File Sharing Security Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at

Demand For Cloud Skills Increases Around The World

By CloudTweaks

Demand for Cloud Skills Increases Thinking about adding more cloud skills to your repertoire? Stop thinking. The time to do it is now. For IT professionals, cloud computing skills are becoming an essential resume item. Companies are actively – and

Five Ways CPQ Is Revolutionizing Selling Today

Five Ways CPQ Is Revolutionizing Selling Today

CPQ Is Revolutionizing Selling Configure-Price-Quote (CPQ) continues to be one of the hottest enterprise apps today, fueled by the relentless ...
Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks of Virtualization

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean ...
How to Improve the Backup Success Rate of Data Centers?

How to Improve the Backup Success Rate of Data Centers?

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing ...
5 Reasons to Head for the Cloud – Part 1

5 Reasons to Head for the Cloud – Part 1

Head for the Cloud Last month Salesforce held its 14th annual Dreamforce event in San Francisco. It has become the ...
Turn to the Cloud as Part of Your Data Breach Strategy

Turn to the Cloud as Part of Your Data Breach Strategy

Data Breach Strategy The latest Verizon Data Breach Investigations Report is out, and the verdict is in: data breaches are ...
Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks: The Prevention and Handling

Mitigating Cyberattacks New tools and technologies help companies in their drive to improve performance, cut costs and grow their businesses ...