Popular

Innovative New Technologies

Innovative New Technologies To Look For in the Future

By CloudTweaks | May 22, 2017

Innovative New Technologies As with every year in IT, 2017 brings a new batch of different trends and exciting technologies. Digitization is changing markets, from security to robotics from healthtech to 3Dprinting the world is changing with the help of innovative new

Countdown to GDPR: Preparing for Global Data Privacy Reform

By Daren Glenister | May 17, 2017

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European Union’s General Data Protection Regulation (GDPR) are in for a rude awakening when 2018 rolls around. It’s not enough for

malware tracking maps

Live Hacking and Ransomware Tracking Maps Online

By CloudTweaks | May 14, 2017

Hacking and Ransomware Tracking Maps We’ve recently covered a few live hacking maps but have decided to extend the list based on the recent ransomware activities with some additional Hacking and Ransomware Tracking Maps. Ransomware refers to malicious software that blocks access

The Future For Cyber Security Looks Uncertain

By Josh Hamilton | May 5, 2017

Future For Cyber Security From the inception of the internet, cyber security has become increasingly more important. As the internet has permeated more and more aspects of our lives, our reliance upon the security of our information has become paramount

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

By Daren Glenister | May 1, 2017

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a rock. The leak unveiled new, yet unsurprising, classified material from the CIA; allegedly sharing information on the U.S. agency’s hacking

Principles of an Effective Cybersecurity Strategy

By Vibhav Agarwal | April 18, 2017

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party

PODCAST – EPISODE 2: Trains, Security and AI

By Steve Prentice | April 12, 2017

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using AI and news about Bitcoin and the Blockchain.  This is a recent interview with Rich Campagna, ‎SVP Products & Marketing at

If 20 Famous Movie Quotes Were About Cloud Computing

By CloudTweaks | April 5, 2017

Cloud Computing and the Movies With a world dominated by mass and social media it is no surprise that pop culture arises from common trends that are marketed with these outlets. This makes me wonder how cloud computing may have

Over 100 New Ransomware Families Discovered Last Year

By Kiril Kirilov | April 4, 2017

100 New Ransomware Families The world in 2016 sees a rapid rise of ransomware attacks that are increasingly targeting specific businesses and entire industries. A report by David Balaban for privacy-pc.com shows that ransomware attacks have occurred virtually on a

What is shadow IT?

How to Make the Move to the Cloud Securely

By Andrew Heikklia | March 29, 2017

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state of cloud adoption in 2017. According to IDG, 70 percent of the survey’s respondent organizations have at least one application

POPULAR

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the ...
What Futuristic Transportation Will Look Like In Your Lifetime

What Futuristic Transportation Will Look Like In Your Lifetime

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could ...
How Big Data Can Empower Native Ads

How Big Data Can Empower Native Ads

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across ...
Cyber Security Tips For Digital Collaboration

Cyber Security Tips For Digital Collaboration

Cyber Security Tips October is National Cyber Security Awareness Month – a joint effort by the Department of Homeland Security ...
Scale Matters in the Enterprise Cloud

Scale Matters in the Enterprise Cloud

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly ...
Chris Gerva

Why Containers Can’t Solve All Your Problems In The Cloud

Containers and the cloud Docker and other container services are appealing for a good reason - they are lightweight and ...
The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a ...
Principles of an Effective Cybersecurity Strategy

Principles of an Effective Cybersecurity Strategy

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as ...