Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Sophisticated Security Intelligence Solution For Hidden Cyber Threats

Sophisticated Security Intelligence Solution For Hidden Cyber Threats

By Penny Swift | June 2, 2015

Niara Unveils Sophisticated Security Intelligence Solution A sophisticated new security intelligence solution, that combines forensics with advanced security data analytics, was launched by Californian-based Cyber security startup, Niara today. The first of its kind, the Niara Security Intelligence Solution has been…

The Multi-Faceted ERP (Enterprise Resources Planning) Business

By CloudTweaks | June 1, 2015

ERP Enterprise Resources Planning Business agility and responsiveness to changing market dynamics has become a crucial factor in remaining abreast of competition and sustaining profits in the long run. To become agile, business must be able to monitor, track, and…

Technologies That Work Nicely With The Cloud

By CloudTweaks | May 26, 2015

New Technologies And The Cloud Asides from all the security concerns that has been in the news over the past while, there are still some very exciting and ambitious opportunities available for those who stick it out. Lets take a…

Cloud Infographic – Top Vulnerable Applications

By CloudTweaks | May 22, 2015

Top Vulnerable Applications  As you use the Internet on a daily basis, you probably come across cyber security topics, but rarely glance at them twice. After all, cyber security threats don’t concern you, right? Well, that’s not exactly true. Cyber attacks…

Encrypting Your Cloud Data For Extra Protection

By Peter HJ van Eijk | May 21, 2015

Encrypting Your Cloud Data Encrypting data is one of the best ways of protecting your data as it moves to the cloud. The only thing better than encrypting your data, is not storing your data at all. Let’s first look…

Protecting Your Web Applications In A Hybrid Cloud Environment

By CloudTweaks | May 18, 2015

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale…

transition to the coud

Why A Company-Wide Cyber Security Course Investment

By CloudBuzz | May 15, 2015

Cyber Security Course Investment Companies are facing serious threats of ransomware, phishing, malware attacks and data breaches that usually cost them big losses running into millions of dollars. These cyber security threats also damage reputations and destroy brands. According to…

Cloud Infographic – Where Sensitive Data Resides

By CloudTweaks | May 14, 2015

Where Sensitive Data Resides Data security remains a top concern for enterprises deploying popular cloud applications. While most will instinctively think of cloud data security and compliance as being handled only by IT departments, many enterprises are realizing that all…

WannaCry North Korea Ransomware Attack

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

By Marc Malizia | May 13, 2015

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of…

Eastern Super-powers Pledge To Fight Cyber Security

By Penny Swift | May 12, 2015

Russia and China Pledge to Fight Together for Cyber Security The world’s two eastern super-powers, Russia and China, have pledged not to attack one another in cyber space and to fight together for “international information security.” More simply, this is…

POPULAR

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have ...
Data Breaches: Incident Response Planning - Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning - Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last ...
Do You Feel Lucky? Why Risk Losing Your Data?

Do You Feel Lucky? Why Risk Losing Your Data?

Why Risk Losing Your Data As your world goes increasingly digital, information and data are your family jewels. Protect them ...
Building a High Growth IT: 5 Tips For 2017

Building a High Growth IT: 5 Tips For 2017

High Growth IT Building and maintaining a cloud computing platform will be much different in 2017 than it has been in ...
The Computer Interface of the Future Is Voice

The Computer Interface of the Future Is Voice

The Computer Interface of the Future Is Voice Only a few years ago, many people viewed voice-recognition technology as something ...
Have You Heard of AI Washing? Meet the Latest Case: An AI Washing Machine!

Have You Heard of AI Washing? Meet the Latest Case: An AI Washing Machine!

Have You Heard of AI Washing? AI (Artificial Intelligence) Washing is the current attempt to imbue the latest, coolest buzz ...
How Will the Internet of Things Change The World of Trucking?

How Will the Internet of Things Change The World of Trucking?

IoT Transportation Ever since sat-navs became commonplace in cars around the world, the relationship between vehicles and wireless data has ...
Where Are Your Users Learning About The Birds And The Bees Of Cloud?

Where Are Your Users Learning About The Birds And The Bees Of Cloud?

Clouding Around Where did you learn about the birds and bees – from your adolescent peers? How did that work ...

NEWSLETTER SUBSCRIBE

CloudTweaks has been a prominent influence covering cloud technologies since 2009. We have worked and continue to work with a tremendous number of writers, contributors and partners throughout the world – all of whom provide insights into the cloud business community. This information is provided to our Newsletter subscribers on a weekly basis - free of charge.

Subscribe to recieve our weekly collection of Best of Thought leadership, Technology news, Tweaks, Curated resource links, Excluisve promotions and our popular Comic series.

JOIN US

Something went wrong. Please check your entries and try again.