Here’s everything you need to know about serverless architectures

By CloudTweaks | November 1, 2017

Serverless Architectures Serverless is an increasingly popular approach to software development that is growing extremely fast in companies of all sizes. The launch of AWS Lambda in 2014 kicked off the serverless movement, and many other cloud providers followed by

Cloud Data Migration

Big Data: Drawing Insight From Security Breaches

By Cloud Syndicate | October 31, 2017

Insight From Security Breaches In the past, security breaches were viewed as a single event occurring at a certain point in time. However, this is no longer the case. Security threats now rarely occur as singular events, and a new

Webroot Threat Research Reveals the Top 10 Nastiest Ransomware Attacks of 2017

By CloudBuzz | October 31, 2017

Nastiest Ransomware Attacks of 2017 BROOMFIELD, Colo., Oct. 31, 2017 /PRNewswire/ — Webroot, a leader in endpoint security, network security, and threat intelligence, revealed the 10 nastiest ransomware attacks to hit within the past year. According to Webroot’s threat research team, NotPetya was

Double-digit Growth of EMEA Security Service Fueled by Complex Data-driven Scenarios

By CloudBuzz | October 31, 2017

Threat detection and remediation to emerge as key market drivers, finds Frost & Sullivan’s Network Security Team LONDON, Oct. 31, 2017 /PRNewswire/ — The managed security services (MSS) market in Europe, Middle East and Africa(EMEA) is experiencing significant transformation. While new market entrants with network-based MSS

How Big Data Is Aiding Police And Security Officers

By Kayla Matthews | October 27, 2017

Big Data Is Aiding Police Officers Big data has become a trusted resource for people in industries ranging from health care to marketing. It shouldn’t be surprising, then, that big data is quickly becoming the future of law enforcement, too. Below,

Future Tech

Gartner’s Top 10 Predictions For IT In 2018 And Beyond

By Louis Columbus | October 26, 2017

Gartner’s Top 10 Predictions For IT In 2018 In 2020, AI will become a positive net job motivator, creating 2.3M jobs while eliminating only 1.8M jobs. By 2020, IoT technology will be in 95% of electronics for new product designs.

WordPress Security 101 – Internal Monitoring Systems and Web Hosting

By CloudTweaks | October 25, 2017

Internal Monitoring Systems Securing your WordPress site requires a lot of adjustments, manual or automated. The “manual” mode relies on a wealth of plugins and little tweaks that give you granular control over what you can do, and how much

JP

The Case for Microservices Sprawl at Sea

By Steve Prentice | October 24, 2017

Microservices Sprawl at Sea Why would anyone want to talk about microservices when they can talk about cruise ships? Taking a cruise is a popular life event for hundreds of thousands of vacationers every year. The image of a huge

DevOps tools

Cloud Security Solutions Still Puzzle Businesses

By Kiril Kirilov | October 24, 2017

Cloud Security Solutions Roughly one third of enterprises in North America experience troubles maintaining their cloud security due to the fast progress in cloud technologies and the complex nature of the cloud, a report by Threat Stack and the Enterprise

Built to Last: Choosing the Right Infrastructure Partner for Your Game

By CloudTweaks | October 23, 2017

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm Newzoo, they’ll drive roughly $108.9 billion in revenue for the industry by the end of this year. As video games

SECURITY

Network security in the era of hybrid cloud

Network security in the era of hybrid cloud

Hybrid Cloud Network Security Protecting networks and the data that traverses them might seem to be an impossible task these days ...
Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) ...
Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all ...
Cloud Services Providers - Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Small Businesses CAN Compete Using The Cloud

Small Businesses CAN Compete Using The Cloud

Small Businesses Cloud In the past, small business owners had to either run applications or software that was downloaded physically ...
A Closer Look at the Hidden Costs of Collaboration Solutions

A Closer Look at the Hidden Costs of Collaboration Solutions

The Hidden Costs of Collaboration Solutions Collaboration technology is key to efficient communication and productivity for a dispersed and global ...
Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) ...
The Unintended – and Intended – Consequences of Cloud Data Sovereignty

The Unintended – and Intended – Consequences of Cloud Data Sovereignty

Cloud Data Sovereignty It seems that everything has unintended consequences – whether positive or negative. Intended consequences are those that ...