Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Security

What You Need To Know About Choosing A Cloud Service Provider

By Nicholas Lee | August 11, 2016

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The cloud is capable of delivering many benefits, enabling greater collaboration, business agility, and speed to market. Cloud adoption in the…

DELUSIONS OF ADEQUACY: WHY PRESIDENTIAL POLICY DIRECTIVE 41 FALLS SHORT

By Daren Glenister | August 10, 2016

Delusions of Adequacy President Obama’s recent policy directive on cybersecurity was eight years in the making. Unfortunately, its proposed actions are barely adequate to the massive task of defending against the onslaught of daily cyber attacks on U.S. companies and…

Modern Artificial intelligence Solutions

By Jennifer Klostermann | August 9, 2016

Artificial Intelligence The field of Artificial Intelligence (AI) is perhaps one of the more exciting tech arenas today, due not least of all to the outlandish visions of science fiction films and novels. However, the gap between imagination and reality…

How The CFAA Ruling Affects Individuals And Password-Sharing

By Erik Kangas | August 9, 2016

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal…

THE CLOUD IS FUELING THE TECH SECTOR’S PROFITS

By Kayla Matthews | August 8, 2016

The Tech Sector’s Profits The tech industry continues to generate huge profits, and for good reason. Internet usage in its various forms keeps growing, leading to demand for tech-related products and services. Over the years, various sectors within tech have…

THE AGE OF DATA: THE ERA OF HOMO DIGITUS

By Evelyn de Souza | August 4, 2016

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction…

Lavabit, Edward Snowden and the Legal Battle For Privacy

By CloudTweaks | August 2, 2016

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic…

SCRaaS Screen as a Service

ADDRESSING BIG DATA CONCERNS THROUGH ANONYMIZATION

By Jennifer Klostermann | August 2, 2016

Addressing Big Data Concerns Data privacy and security concerns have mounted in the last few years as the potential of Big Data is tapped and more effectively realized. The bits and bytes of our lives are, more now than ever…

5 Things To Consider About Your Next Enterprise Sharing Solution

By CloudTweaks | August 1, 2016

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction…

THE TOP 5 CLOUD SECURITY THREATS YOU NEED TO WORRY ABOUT

By CloudBuzz | August 1, 2016

Cloud Security Threats Cloud computing is clearly here to stay, and has become an integral part of any business computing strategy. For many businesses, the power, flexibility, and convenience of cloud applications outweigh the security risks — but that doesn’t…

POPULAR

Roundup Of Cloud Computing Forecasts, 2017

Roundup Of Cloud Computing Forecasts, 2017

Cloud Computing Forecasts Cloud computing is projected to increase from $67B in 2015 to $162B in 2020 attaining a compound ...
Our Computers Can Recognize Faces but Imagine Seeing Through an Animal’s Eyes. Now We Can.

Our Computers Can Recognize Faces but Imagine Seeing Through an Animal’s Eyes. Now We Can.

Seeing Through An Animal’s Eyes Computer Vision and Facial Recognition have gone from rare and difficult to increasingly available thanks ...
The Economy Just Limps Along. Guess Who’s to Blame?

The Economy Just Limps Along. Guess Who’s to Blame?

Productivity seems down the drain. Unemployment is at historic lows yet real wage growth is pathetic. Why? Hard to believe ...
Cloud Services Providers - Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from ...
Major Cloud Outages

Major Cloud Outages: Five Things Organizations Can Do To Protect Against Network Failures

Recent Major Cloud Outages It is no surprise that whenever there is an outage in a public or private cloud, ...
Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker and the Cloud-based Business Role

Cloud Access Security Broker (CASB) Cloud is the new address for businesses nowadays. The number of applications, hosted on the ...
3 Developing Expectations For The IoT

3 Developing Expectations For The IoT

IoT Expectations The Internet of Things, or IoT, has received a lot of attention from tech analysts and curious consumers ...
Part 1 - How Cloud Apps Are Making Businesses More (and Less) Secure

Part 1 – How Cloud Apps Are Making Businesses More (and Less) Secure

Cloud Apps Security Today, more than ever before, employees are working while on-the-go. The ease with which a worker can ...