Popular

disaster recovery solutions

Disaster Recovery Planning Should Be Non-negotiable For Every Business

By Jeremy Daniel / May 31, 2017

Disaster Recovery Planning In today’s competitive business environment, being unable to service your customers needs can spell the end of your business. Customers in a different city, or even a different country, may not know or understand that a flood,

Read More

What Futuristic Transportation Will Look Like In Your Lifetime

By Cloud Syndicate / May 30, 2017

Futuristic Transportation Being stuck in traffic or late for work because of a hold up on the dreaded commute could be a thing of the past from as soon as 2020. It’s no secret that technology has been continuously evolving

Read More

Cloud’s Mighty Role – Why Custom Development is the Next Big Thing (Again)

By Sean Peterson / May 25, 2017

Custom Development is the Next Big Thing Today, software is playing a very important role in performing basic business processes and serving customers. Leading software development trends are helping companies perform faster at lower costs, and collaborate and innovate more

Read More

Countdown to GDPR: Preparing for Global Data Privacy Reform

By Daren Glenister / May 17, 2017

Preparing for Global Data Privacy Reform Multinational businesses who aren’t up to speed on the regulatory requirements of the European Union’s General Data Protection Regulation (GDPR) are in for a rude awakening when 2018 rolls around. It’s not enough for

Read More
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

By Kiril Kirilov / May 14, 2017

Real Time Hacking Attacks We’ve recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious

Read More

The Future For Cyber Security Looks Uncertain

By Josh Hamilton / May 5, 2017

Future For Cyber Security From the inception of the internet, cyber security has become increasingly more important. As the internet has permeated more and more aspects of our lives, our reliance upon the security of our information has become paramount

Read More

The Good, Bad, and Downright Ugly Takeaways from WikiLeaks’ Vault 7

By Daren Glenister / May 1, 2017

WikiLeaks’ Vault 7 If you haven’t heard of the Vault 7 WikiLeaks data dump, you’ve probably been living under a rock. The leak unveiled new, yet unsurprising, classified material from the CIA; allegedly sharing information on the U.S. agency’s hacking

Read More

The Cloudification of Healthcare: Benefits and Risks

By Ken Adamson / April 24, 2017

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The healthcare industry is no exception – hospitals, payers and other organizations also are making moves to the cloud. While they’re

Read More

Principles of an Effective Cybersecurity Strategy

By Vibhav Agarwal / April 18, 2017

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party

Read More

Podcast #2: Trains, Security and AI

By Steve Prentice / April 12, 2017

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using AI and news about Bitcoin and the Blockchain.  This is a recent interview with Rich Campagna, ‎SVP Products & Marketing at

Read More