Popular

What is shadow IT?

How to Make the Move to the Cloud Securely

By Andrew Heikklia | March 29, 2017

Move to the Cloud Securely The 2016 Enterprise Cloud Computing Survey from IDG offers multiple interesting insights concerning the state of cloud adoption in 2017. According to IDG, 70 percent of the survey’s respondent organizations have at least one application

Cloud Services Are Vulnerable Without End-To-End Encryption

By Randy Battat | March 27, 2017

End-To-End Encryption The growth of cloud services has been one of the most disruptive phenomena of the Internet era.  However, even the most popular cloud services (including Yahoo, Gmail, Microsoft Outlook 365, and Dropbox) are vulnerable to attack because their

3 Ways to Protect Users From Ransomware With the Cloud

By Karin Ratchinsky | March 22, 2017

Protect Users From Ransomware The threat of ransomware came into sharp focus over the course of 2016. Cybersecurity trackers have been aware of ransomware for almost a decade. Observed instances had been steadily rising, with 3.2 million reported in 2014

10 Security Related Resources

By Kiril Kirilov | March 8, 2017

Security Resources We have a compiled a small list of interesting free security tools and resources as part of our ongoing effort to provide many of the best curated discoveries to our readership. Please continue to visit CloudTweaks as we

Smart cloud

Experts Believe Multi-cloud Implementations Can Be Invaluable

By Jennifer Klostermann | March 3, 2017

Multi-Cloud Environment The outage this week at Amazon Web Services S3 cloud storage services has created quite a stir, with multi-cloud competitors touting the need for contingency plans in case of such an event. The cost to businesses is potentially

Technology Certification Courses

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

By CloudTweaks | March 3, 2017

AWS S3 Outage & Lessons Earlier this week, AWS S3 had to fight its way back to life in the US-east-1 Region with multiple Availability Zones in the throes of recovery, and potentially hundreds of thousands of websites and applications

Safeguarding Data Before Disaster Strikes

By CloudTweaks | February 28, 2017

Safeguarding Data  Online data backup is one of the best methods for businesses of all sizes to replicate their data and protect against data loss in the event of an IT outage or security incident. While online backup services offer

Numeraire Cryptocurrency

Numeraire Cryptocurrency Goes Live

By Kiril Kirilov | February 27, 2017

Numeraire cryptocurrency Numerai, a hedge fund started in late 2015 by mathematician Richard Craib. The new Numerai cryptocurrency comprises digital tokens that allow crowdsourcing of literary anything. Cryptocurrencies are essentially internet based assets used to finance any purchase or endeavor

How Big Data Can Empower Native Ads

By Shachar Shamir | February 16, 2017

Empower Native Ads The realm of big data is expanding an astonishing rate, and its presence can be felt across many walks of life, making its mark from the pharmaceutical industry to cybersecurity and even extending as far as to

Why ‘Data Hoarding’ Increases Cybersecurity Risk

By Ankur Laroia | February 13, 2017

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated solution, poses a challenge to businesses, in terms of both compliance and security. This is not helped by the estimation

How Can We Use Artificial Intelligence When We Can’t Handle Real Intelligence?

By Josh Hamilton | February 8, 2017

Artificial Versus Real Intelligence In this article we will be discussing the pitfalls of societal disillusionment with facts, and how this trend may become troubling for the oncoming artificial intelligence revolution. Dr Edward Maibach has frequently lamented the “huge disconnect

Scale Matters in the Enterprise Cloud

By Allan Leinwand | January 30, 2017

The Enterprise Cloud What used to be an unknown and mysterious term, “the cloud” is now a common and mostly understood technology. At the most basic level, consumers see the cloud as a place where their photos are backed up