How IRM Makes Cloud-Based File Collaboration “Security-Aware”

By Daren Glenister | March 1, 2016

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How

IoT developers

Infographic: IoT Programming Essential Job Skills

By CloudTweaks | February 29, 2016

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment –

Re-Defining Security – It’s More Than Just Compliance

By CloudTweaks | February 29, 2016

Re-Defining Security Risk management is messy. The internet has known vulnerabilities, and regulatory issues seem to change faster than you can say “Privacy Shield.” So why can’t security and compliance teams see eye to eye? Sixty-four percent of IT executives

industry

Spotify and Google – A Marriage Made In The Cloud

By Cloud Syndicate | February 26, 2016

Spotify and Google The world of online music and movies has shifted from downloading to streaming, which means that the vast majority of data is now being stored somewhere in the “cloud”. In order to stay ahead of the competition,

The Lighter Side Of The Cloud – F96qL#5

By David | February 26, 2016

By David Fletcher Please feel free to share our comics via social media networks such as Twitter with a clear attribution (Twitter example: via @cloudtweaks) to the original comic source. If you are a company brand looking to utilize our

Lessons Learned From Recent Cloud Security Debacles

By Cloud Syndicate | February 25, 2016

Recent Cloud Security Debacles Just as cloud computing is on the rise, so are cloud security threats, and they should be on the top priority list of every organization that has embraced cloud-based services. Incidents of cybercrime are being reported

Microsoft Powers Up With Purchase Of Xamarin

By Jeremy Daniel | February 25, 2016

Microsoft’s Recent Acquisition  To many tech commentators, the emerging cloud economy looked like it would be dominated by two familiar giants: Google and Amazon. Google recently announced that Spotify would be using its cloud architecture for its backend, while AWS

AROUND THE CLOUD: What’s Making Tech News Today

By Jeremy Daniel | February 24, 2016

Around The Cloud Three big stories dominate the web this Tuesday morning and signal huge shifts in the industry landscape; two involving Google and one regarding Apple. Let’s take a quick look: Google’s cloud services received a major endorsement with

2016 Connected Enterprises Report

By Jennifer Klostermann | February 24, 2016

Connected Enterprises Report Dimension Data’s 2016 Connected Enterprise Report is out, discussing collaboration trends, insights, and strategies in the digital age. With the promise of lower costs coupled with greater productivity, increased agility and better customer engagement, collaboration technologies are

Protecting Devices From Data Breach: Identity of Things (IDoT)

By Michela Menting | February 23, 2016

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming

SECURITY

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated ...
How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home ...
Major Cloud Outages

Major Cloud Outages: Five Things Organizations Can Do To Protect Against Network Failures

Recent Major Cloud Outages It is no surprise that whenever there is an outage in a public or private cloud, ...
A Closer Look at the Hidden Costs of Collaboration Solutions

A Closer Look at the Hidden Costs of Collaboration Solutions

The Hidden Costs of Collaboration Solutions Collaboration technology is key to efficient communication and productivity for a dispersed and global ...
The Path to the Cloud: A Look at Different Approaches to Cloud Migration

The Path to the Cloud: A Look at Different Approaches to Cloud Migration

Different Approaches to Cloud Migration The public cloud has gained considerable momentum this past decade. Concerns about cost and security ...
Best Practices in Disaster Recovery and Business Continuity

Best Practices in Disaster Recovery and Business Continuity

Disaster Recovery and Business Continuity Hope for the best, prepare for the worst, and expect to be surprised. While that ...
3 Ways to Protect Users From Ransomware With the Cloud

3 Ways to Protect Users From Ransomware With the Cloud

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have ...
Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies ...
Small Businesses CAN Compete Using The Cloud

Small Businesses CAN Compete Using The Cloud

Small Businesses Cloud In the past, small business owners had to either run applications or software that was downloaded physically ...
What You Need To Know About Choosing A Cloud Service Provider

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...