Has Cybersecurity Become Too Reactive?

John Davis, CSO of Palo Alto Networks' federal division, suggested that too many firms have given in to the hackers by resigning themselves to this reactionary approach. "Some of our industry has given up on the ability to prevent and is focused primarily on detection and response, which means, with a mindset like that, it means you're always involved in cleaning up aisle nine, as some people like to say..."

Reports

73% of Executives Are Researching & Launching IoT Projects

By Louis Columbus | October 12, 2017

New IoT Projects Manufacturing-based IoT connections grew 84% between 2016 and 2017, followed by energy & utilities (41%). 73% of executives are either researching or currently launching IoT projects. The IoT platform market is expected to grow 35% per year…

Spiceworks Survey: Tech Spending Expected to Rise as IT Budgets Stabilize in 2018

By Cloud Syndicate | October 11, 2017

Tech Spending Expected to Rise Market optimism drives growth and adoption of emerging technologies like IoT, AI, and VR AUSTIN, Texas, Oct. 11, 2017 (GLOBE NEWSWIRE) — Today at SpiceWorld 2017, Spiceworks announced the results of its 2018 State of IT report, a study…

Worldwide Cloud IT Infrastructure Revenues Grow 25.8% in the Second Quarter of 2017

By CloudBuzz | October 6, 2017

Driven by Expansion in Public Cloud FRAMINGHAM, Mass., October 5, 2017 – According to the International Data Corporation (IDC) Worldwide Quarterly Cloud IT Infrastructure Tracker, vendor revenue from sales of infrastructure products (server, storage, and Ethernet switch) for cloud IT, including public…

Critical Success Factors when shifting Workloads into the Cloud

By Marc Wilczek | September 12, 2017

Shifting Workloads into the Cloud By 2020, 92 percent of all workloads will reside in the cloud. Yet challenges remain. Here is how to make your journey a success. The cloud has become the preferred hosting location of choice, with…

Clutch Report: How Large Businesses Approach Cybersecurity in 2017

By Cloud Syndicate | August 31, 2017

Cybersecurity in 2017 IT decision-makers at large companies in the US invest in cybersecurity and stress security software and data storage as the cornerstones of cybersecurity policy. Companies also grapple with employees’ disdain for strict policy enforcement. Overall, investing in…

Cloud Email Security Concerns

GreatHorn Report: Cloud Email Security Concerns

By CloudTweaks | July 28, 2017

Cloud Email Security Concerns “The Cloud Email Security Challenge: Closing the Cybersecurity Skills Gap Through Automation.” The company analyzed more than 3.5 terabytes of data – over 373 million corporate emails – from its proprietary data cloud to gain insights…

Research Report: Emergency Management Leaders Discuss the Security of Mobile, Remote Workers

By Cloud Syndicate | June 29, 2017

The Security of Mobile, Remote Workers Everbridge, Inc., a global software company that provides critical event management and enterprise safety applications to help keep people safe and businesses running, recently announced the findings of its research into the safety of mobile, remote…

2017 Top Ten European Cloud Service Providers Report

By CloudBuzz | May 16, 2017

2017 Top Ten European Cloud Service Providers BOSTON, May 16, 2017— Cloud Spectator, the industry leading Infrastructure-as-a-Service (IaaS) Performance Benchmarking agency, today released its 2017 Top Ten European Cloud Service Providers Report, with OVH achieving the highest CloudSpecs Score™ in…

Key statistics from BakerHostetler’s 2017 Data Security Incident Response Report:

By CloudBuzz | April 19, 2017

BakerHostetler’s 2017 Data Security Incident Response Report NEW YORK, April 19, 2017 /PRNewswire/ — The BakerHostetler 2017 Data Security Incident Response Report highlights the critical need for senior executives in all industries to understand and be ready to tackle the…

The Unintended – and Intended – Consequences of Cloud Data Sovereignty

By Allan Leinwand | March 9, 2017

Cloud Data Sovereignty It seems that everything has unintended consequences – whether positive or negative. Intended consequences are those that are chosen. Unintended consequences are forced upon us. The consequences surrounding data sovereignty regulations are no different. The adoption of…

POPULAR

Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...
The Future is Bright for Banking

The Future is Bright for Banking

Banking Future 2018 is likely to be a game-changing year for the banking and finance sector. As the General Data ...
THE CLOUD IS FUELING THE TECH SECTOR’S PROFITS

THE CLOUD IS FUELING THE TECH SECTOR’S PROFITS

The Tech Sector’s Profits The tech industry continues to generate huge profits, and for good reason. Internet usage in its ...
4 Tech Cleanups For National Cyber Security Awareness

4 Tech Cleanups For National Cyber Security Awareness

National Cyber Security Awareness October is Cyber Security Awareness Month, and President Obama recently called upon the American people to ...
When You Will Encounter Genuine Emotional AI

When You Will Encounter Genuine Emotional AI

Genuine Emotional AI Recent tremendous growth of mobile technologies and advancements of artificial intelligence (AI) in virtually any industry will ...
Open APIs Alone Won’t Change Banking

Open APIs Alone Won’t Change Banking

Open Banking API's Most people think of banks as one monolithic entity, but they are actually made up of hundreds ...
cloud 2020

IoTT, The Internet of Things, Tomorrow

What Should Your Home Be Telling You? Home. The place where you lay your head to sleep, where a roof ...
Part 1 - Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even ...