Popular

The Cloudification of Healthcare: Benefits and Risks

By Ken Adamson / April 24, 2017

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The healthcare industry is no exception – hospitals, payers and other organizations also are making moves to the cloud. While they’re

Read More

Principles of an Effective Cybersecurity Strategy

By Vibhav Agarwal / April 18, 2017

Effective Cybersecurity Strategy A number of trends contribute to today’s reality in which businesses can no longer treat cybersecurity as an afterthought. These include a rapid increase in the number of internet connected devices, an increased dependency on third party

Read More

PODCAST – EPISODE 2: Trains, Security and AI

By Steve Prentice / April 12, 2017

CloudTweaks Podcast The power of Twitter, the importance of teaming up with a cloud security specialist, how trains are using AI and news about Bitcoin and the Blockchain.  This is a recent interview with Rich Campagna, ‎SVP Products & Marketing at

Read More

If 20 Famous Movie Quotes Were About The Cloud

By CloudTweaks / April 5, 2017

Cloud Quotes With a world dominated by mass and social media it is no surprise that pop culture arises from common trends that are marketed with these outlets. This makes me wonder how cloud computing may have looked different if famous

Read More

Over 100 New Ransomware Families Discovered Last Year

By Kiril Kirilov / April 4, 2017

100 New Ransomware Families The world in 2016 sees a rapid rise of ransomware attacks that are increasingly targeting specific businesses and entire industries. A report by David Balaban for privacy-pc.com shows that ransomware attacks have occurred virtually on a

Read More
What is shadow IT?

How to Make the Move to the Cloud Securely

By Andrew Heikklia / March 29, 2017

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state of cloud adoption in 2017. According to IDG, 70 percent of the survey’s respondent organizations have at least one application

Read More

Cloud Services Are Vulnerable Without End-To-End Encryption

By Randy Battat / March 27, 2017

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, even the most popular cloud services (including Yahoo, Gmail, Microsoft Outlook 365, and Dropbox) are vulnerable to attack because their

Read More

3 Ways to Protect Users From Ransomware With the Cloud

By Karin Ratchinsky / March 22, 2017

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have been aware of ransomware for almost a decade. Observed instances had been steadily rising, with 3.2 million reported in 2014

Read More

10 Security Related Resources

By Kiril Kirilov / March 8, 2017

Security Resources We have a compiled a small list of interesting free security tools and resources as part of our ongoing effort to provide many of the best curated discoveries to our readership. Please continue to visit CloudTweaks as we

Read More
Smart cloud

Experts Believe Multi-cloud Implementations Can Be Invaluable

By Jennifer Klostermann / March 3, 2017

Multi-Cloud Environment The outage this week at Amazon Web Services S3 cloud storage services has created quite a stir, with multi-cloud competitors touting the need for contingency plans in case of such an event. The cost to businesses is potentially

Read More