Cloud computing – the next industrial revolution

By CloudTweaks | October 25, 2010

Article Credit to Scott Stewart (CIO) The term ‘Cloud computing’ continues to receive a lot of attention from the media, and within the IT industry there is perpetual debate on definitions and from vendors a relentless succession of press releases

Cloudbuilding – Multiple personalities preferred

By CloudTweaks | October 22, 2010

Cloudbuilding – multiple personalities preferred We have arrived to the point where our quest for understanding the terrain has provided us with a map, compass and a potential destination. You are now at the ”make it or break it-”point. Drawing

Cloud Safari – investigate the surroundings

By CloudTweaks | October 19, 2010

Investigate the surroundings “Live with your head in the clouds, as long as you keep your feet steadily planted on solid ground!” This is the shortest possible version of the initial investigative phase of your Cloud Safari. If you feel

cloud security issues

Cloud Security Issues – Is The Cloud Insecure?

By CloudTweaks | September 23, 2010

Cloud Security  Issues – Is The Cloud Insecure? Cloud security issues are a top concern of every CIO’s mind. Apparently some people even consider that cloud risks outweigh cloud benefits.  Unfortunately, an overzealous approach to cloud security can lead to arguments

MimeCast Chief Scientist & Chief Security Officer Discuss Cloud Security

By CloudTweaks | September 13, 2010

MimeCast Chief Scientist & Chief Security Officer Discuss Cloud Security In your own words, please describe Mimecast and the company’s service to readers. Nathaniel: Mimecast is a cloud-based email management company. We provide our customers with a unified solution for

Top 10 Cloud Computing Trends

By Glenn Blake | August 19, 2010

Cloud Computing Trends People, companies, businesses, and organizations are fast shifting to cloud computing from client-server model. It is very hard to guess what cloud computing will exactly look like in the future or how it will bring changes in IT.

The Security Benefits of Cloud Computing

By Glenn Blake | August 15, 2010

The Security Benefits of Cloud Computing Cloud computing offers many advantages and some disadvantages while offering its servers to be used by customers. Security is both an advantage and disadvantage of the cloud-based environment.  Because of the immense size, skilled

cloud

Cloud Computing Maturity – How To Shift to Cloud-Based Technology

By Glenn Blake | August 12, 2010

Cloud Computing Maturity Cloud computing is still not mature enough to give a final verdict about its usability. However, there is no doubt that there is a constant paradigm shift to cloud based computing. Before you shift your business or infrastructure

Cloud Computing Best Practices to Adopt

By Glenn Blake | August 10, 2010

Cloud Computing Best Practices Cloud based computing offers the most sought after advantages to corporations and all with reduced cost and easy implementation. With the passage of time corporations are becoming more specialized and skilled in their operations. Instead of

CloudTweaks Media Partner For The Cloud Security Alliance Congress November 16-17

By CloudTweaks | July 20, 2010

The Cloud Security Alliance Congress CloudTweaks is pleased to be a Media Partner with the MIS Training Institute and The Cloud Security Alliance Congress. The Cloud Security Alliance, the world’s leading organization on cloud security and MIS Training Institute are

SECURITY

Bryan Doerr

Cyber-Threats and the Need for Secure Industrial Control Systems

Secure Industrial Control Systems (ICS) Industrial Control Systems (ICS) tend to be “out of sight, out of mind.” These systems ...
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their ...
Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information ...
Small Businesses CAN Compete Using The Cloud

Small Businesses CAN Compete Using The Cloud

Small Businesses Cloud In the past, small business owners had to either run applications or software that was downloaded physically ...
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing ...
Bryan Doerr

Can You Afford the Risk of Not Going to the Cloud?

Risk of Not Going to the Cloud If you’re considering a migration to a public cloud environment, you’re most likely ...
How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home ...
Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has ...
State of the Cloud Report In 2017

State of the Cloud Report In 2017

Cloud Report 2017 As the definitive guide to the biggest trends in the cloud industry, this year’s “State of the ...
Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Cloud-Enabled Managed Hosting Provider We are all familiar with the old saying “That's like comparing apples to oranges” and though ...