OVH Announces New Hosted Private Cloud Offerings for US Market

By CloudBuzz | November 20, 2017

OVH delivers next-generation services for hosted private cloud, disaster recovery, and hybridity leveraging industry-leading solutions RESTON, VA–(Marketwired – Nov 20, 2017) – OVH, a global hyper-scale cloud provider, today announced the next-generation Hosted Private Cloud offerings, evolving the vCloud® Air™ powered

Fake Digital Currency

How to Spot Fake Digital Currency

By Kiril Kirilov | November 20, 2017

Fake Digital Currency With the Bitcoin currency skyrocketing to levels above $8,000 per bitcoin and initial coin offerings emerging on a daily basis, a growing number of individuals and institutional investor look at cryptocurrencies as an alternative to more traditional

Endpoint Security

WordPress Security 101 – Endpoint Security And Disaster Preparedness

By CloudTweaks | November 17, 2017

Endpoint Security And Disaster Preparedness Continued from part 4 Setting up a secure password for your admin dashboard is a tactic that sets you on the right track to a robust WordPress security. But one smart tactic, or a combination

A Quick and Dirty Guide to GDPR Compliance

By CloudTweaks | November 15, 2017

GDPR Compliance Set a reminder: On May 25, 2018, the new General Data Protection Regulation directive from the European Union will go into effect. Although its goal to protect consumer data is admirable, about a third of global companies don’t know whether

How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

By Steve Prentice | November 15, 2017

Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a choice as to who to work with, but do you know what will help tip the scales in your favor?

How to Improve the Backup Success Rate of Data Centers?

By Cloud Syndicate | November 14, 2017

Improve Backup Success Rate According to industry analysts, a significant number of backup jobs (from 5 to 25%) are failing across various tiers of data centers. This impacts datacenters heavily on revenue loss, SLA-based penalties, and customer experience. Furthermore, loss

Evolving the enterprise network architecture in the era of hybrid cloud

By Mark Casey | November 13, 2017

Enterprise Network Architecture The use of cloud infrastructure and SaaS applications has been a key element in helping companies improve business processes. One missing ingredient to a better performance is still a truly agile network. CEOs don’t have to start

How Modern Architects Transform the Messy Mix of Hybrid Cloud into a Force Multiplier

By Dana Gardner | November 10, 2017

Modern Architects Transform The next BriefingsDirect cloud strategies insights interview focuses on how IT architecture and new breeds of service providers are helping enterprises manage complex cloud scenarios. We’ll now learn how composable infrastructure and auto-scaling help improve client services, operations, and business

How to protect your data with the 3-2-1 strategy

By Alexander Negrash | November 10, 2017

How To Protect Your Data Every once in a while we all find ourselves in a situation where our data is irrecoverably lost. Be it hardware malfunction, nasty ransomware, or failure to repeatedly press Ctrl+S while working on that crucial

Why Open Source Technology is the Key to Any Collaboration Ecosystem

By Bobby Beckmann | November 8, 2017

Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely – is a hot topic in the world of technology development and for good reason. In my opinion, the trend

SECURITY

A Closer Look at the Hidden Costs of Collaboration Solutions

A Closer Look at the Hidden Costs of Collaboration Solutions

The Hidden Costs of Collaboration Solutions Collaboration technology is key to efficient communication and productivity for a dispersed and global ...
6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications That Any Small Business Owner Can Use

6 Blockchain Applications Although associated with the virtual currency bitcoin, blockchain technology can be applied across multiple industries, and it ...
The Cloud Isn’t a Security Issue; It’s a Security Opportunity

The Cloud Isn’t a Security Issue; It’s a Security Opportunity

Security Issue In order to stay ahead in today’s competitive business landscape, companies need to constantly innovate. Development teams must ...
Data Breaches: Incident Response Planning - Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning - Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last ...
The Cloud Has Your Data (Whether You Like It Or Not)

The Cloud Has Your Data (Whether You Like It Or Not)

Cloud Cleanup Anyone? Following on where we left off from my last two articles now we shift focus to what ...
Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) ...
Chris Gerva

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...
Your Biggest Data Security Threat Could Be....

Your Biggest Data Security Threat Could Be….

Biggest Data Security Threat Your biggest data security threat could be sitting next to you… Data security is a big ...
How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home ...
Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attackers Targeting the Keys to the Cloud Kingdom

Cyber Attacking Targets Privileged Credentials Used to Administer Cloud Services Make an Attractive Target and Entry Point for Attackers In ...