Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Mobile Phones – Cyber Security Threat Within US Department of Defense

Mobile Phones – Cyber Security Threat Within US Department of Defense

By Penny Swift | July 9, 2015

Cyber Security Threat A recent whitepaper on cyber security in the US government reveals that that the increasing number of mobile phones being used within federal agencies is escalating the risk of cyber threat from inside agencies. It also cites…

Data Violations – Record Year For Data Breaches

By Jennifer Klostermann | July 7, 2015

Record Year For Data Breaches The news is full of data security breaches. This week, Sputnik International reported that Hacking Team had a 400 GB database stolen and published, and last month Ars Technica discussed in detail the information breach…

CDN Performance Report – Month of June – 2015

By CloudTweaks | July 2, 2015

CDN Performance Report Each month CloudTweaks will be providing a series of benchmark testing performance reports conducted by our contributing partners. The first in our series will be on (CDN) Content Delivery Networks which is a growing industry whose customers…

7 Cloud Security Mistakes Bound To Bite You

By CloudTweaks | July 2, 2015

7 Main Cloud Security Mistakes  Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise’s data apply.…

The Business of Security: Avoiding Risks

By Jennifer Marsh | July 1, 2015

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for…

Cisco Expands Portfolio By Acquiring Threat Protection Firm OpenDNS

By CloudTweaks | June 30, 2015

Cisco Announces Intent to Acquire OpenDNS Acquisition to Accelerate Cisco’s Cloud Delivered Security Portfolio SAN JOSE, Calif. – June 30, 2015 – Today, Cisco announced its intent to acquire OpenDNS, a privately held security company based in San Francisco. OpenDNS…

Cyber Security Is BIG Business

By Penny Swift | June 30, 2015

Cyber Security Investments Are Growing Cyber Security shares on Wall Street are soaring as hackers continue to crack into the cyber defense systems set up by government agencies, banks and retailers. Ongoing high-profile breaches have led to larger-than-life share increases…

Cloud Workloads and the Secret Metadata

By CloudTweaks | June 30, 2015

Cloud Workloads Do you feel you know your cloud workloads well? Remember when those applications were running locally? You knew every quirk and cared for every surge. Now, they are in the cloud, and everything is different. Sometimes it feels…

How To Choose The Right Cloud Security Package For Your Business

By Gary Gould | June 29, 2015

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your…

The Future Of Cybersecurity

By CloudTweaks | June 17, 2015

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the…

POPULAR

How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...
What Is Really Driving Cloud Adoption?

What Is Really Driving Cloud Adoption?

Driving Cloud Adoption Cloud adoption is growing at an astounding rate, with companies big and small undergoing digital transformation towards ...
How Strategy – Not Technology – Is The Real Driver For Digital Transformation

How Strategy – Not Technology – Is The Real Driver For Digital Transformation

The Real Driver For Digital Transformation Business owners and executives today know the power of social media, mobile technology, cloud ...
MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape is Failing Brand Marketers

MarTech’s Fragmented Landscape Mapping the customer journey is one of the biggest strategic shifts currently underway in the marketing industry ...
IoT Trends

The Internet of Attacks: Disturbing Online IoT Trends

Disturbing Online IoT Trends If you thought the worst thing to come out of the Internet of Things (IoT) trend ...
IoT Security Intel

Cyber IoT Security: McAfee on Threats and Autonomous Cars

IoT Security Autonomous cars are just around the corner, there have been IoT security controversies surrounding their safety, and a ...
10 Free Security Related Tools and Resources

10 Free Security Related Tools and Resources

Free Security Tools We have a compiled a small list of interesting free security tools and resources as part of ...

NEWSLETTER SUBSCRIBE

CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to recieve our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Excluisve promotions and our popular Comic series.

JOIN US

Something went wrong. Please check your entries and try again.