RANSOMWARE TRACKING MAPS

Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

blockchain credit security

Is blockchain a solution for credit security?

By CloudTweaks | December 11, 2017

Blockchain Credit Security In the last 30 years, FICO scores were considered a reliable solution to measure creditworthiness and attach a risk score to each applicant. As the sub-prime mortgage crisis of 2008 proved it, this system was neither accurate

Don't be held hostage by Ransomware: 7 Prevention Tips

By Cloud Syndicate | December 8, 2017

Ransomware Prevention Tips Ransomware can bring your business to its knees. Whether it comes as a system- or network-wide infection, it can do a severe damage to your company. Ransomware starts with malware that infects a system by using malicious

Breached Data

Breached Data – Keeping it Secret Doesn’t Make It Go Away

By Steve Prentice | December 6, 2017

Breached Data When Uber’s massive data breach made it to the public’s ears recently, it became a member of an infamous group of companies who not only had vital customer data stolen, but who sat on the story and did

Repeat After Me… Nobody Is Safe From Cyber Attacks

By Andrew Heikklia | December 1, 2017

Nobody Is Safe From Cyber Attacks The last couple of years have shown the world that seemingly nobody is safe from cyber attacks. The 2017 breach of Equifax was proof that now, even the common person should begin paying attention to

Inside story on HPC's role in the Bridges Research Project at Pittsburgh Supercomputing Center

By Dana Gardner | November 30, 2017

The next BriefingsDirect Voice of the Customer high-performance computing (HPC) success story interview examines how Pittsburgh Supercomputing Center (PSC) has developed a research computing capability, Bridges, and how that's providing new levels of analytics, insights, and efficiencies. We'll now learn

Learning to Code is as Useful as Learning Ancient Greek

By John Pientka | November 29, 2017

Your children will be left behind if they don’t learn to code. Really? What if coding as we know it is already a dying language? What if most programs in the future will be coded by Artificial Intelligences? Where do

5 Predictions for Data in the Cloud and Cloud Platforms

By Daren Glenister | November 29, 2017

5 Predictions for Data in the Cloud 2017 has proven to be a big year for migrating data to the cloud and cloud platforms: from Google to Microsoft and IBM to Oracle, enterprise organizations have recognized the importance of migrating

Network security in the era of hybrid cloud

By Mark Casey | November 28, 2017

Hybrid Cloud Network Security Protecting networks and the data that traverses them might seem to be an impossible task these days. Whether it’s a nation-state-sponsored infiltration that seeks to tamper with industrial systems or a criminal organization planting ransomware for profit,

This Amsterdam Bank Wants To Hack … Itself?

By Kayla Matthews | November 21, 2017

Bank Wants To Hack … Itself? With instances of professional hacking and data leaks making the news every year, it’s no secret that cybersecurity has become a major concern. How does a corporation ensure its cybersecurity remains impenetrable in a world

Survey: 87% of Businesses Are Confident About Cybersecurity

By Daniel Matthews | November 20, 2017

Businesses Confident About Cybersecurity In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey reveals 87 percent of businesses are “confident in their cybersecurity preparedness.” The survey, from SolarWinds MSP, included 400 businesses from

Fake Digital Currency

How to Spot Fake Digital Currency

By Kiril Kirilov | November 20, 2017

Fake Digital Currency With the Bitcoin currency skyrocketing to levels above $8,000 per bitcoin and initial coin offerings emerging on a daily basis, a growing number of individuals and institutional investor look at cryptocurrencies as an alternative to more traditional

Endpoint Security

WordPress Security 101 – Endpoint Security And Disaster Preparedness

By CloudTweaks | November 17, 2017

Endpoint Security And Disaster Preparedness Continued from part 4 Setting up a secure password for your admin dashboard is a tactic that sets you on the right track to a robust WordPress security. But one smart tactic, or a combination

RESOURCES

ARCHIVE

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
Why Open Source Technology is the Key to Any Collaboration Ecosystem

Why Open Source Technology is the Key to Any Collaboration Ecosystem

Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely ...
Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and ...
Four Cloud Security Mega Trends

Four Cloud Security Mega Trends

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid ...
Battling Bandwidth: How to Make the Most of Collaboration Technology with What You’ve Got

Battling Bandwidth: How to Make the Most of Collaboration Technology with What You’ve Got

Collaboration Technology As collaboration technology adoption grows, high-definition (HD) video has become the industry standard and has replaced the traditional, ...
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Private Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle ...
Cloudification - Budgets are Shifting Toward a “Cloud-first” and “Cloud-only” Approach

Cloudification – Budgets are Shifting Toward a “Cloud-first” and “Cloud-only” Approach

Cloudification and the Budget Shift Gartner has recently predicted that by 2020, a corporate "no-cloud" policy will be as rare ...
RSA Conference: FUD-free or filled?

RSA Conference: FUD-free or filled?

IoT 15 Billion Units By 2021 At the annual RSA conference, there were plenty of discussions and presentations on the ...
Combatting Malware in the Cloud Requires a New Way of Thinking

Combatting Malware in the Cloud Requires a New Way of Thinking

Malware in the Cloud It’s no secret that cloud adoption has exploded in the enterprise over last few years. However, ...

SPONSORS

Scale your Windows Azure application

Help Your Business Improve Security By Choosing The Right Cloud Provider

Choosing The Right Cloud Provider Security issues have always been a key aspect of business planning; failure to properly protect ...
Ransomware's Great Lessons

Ransomware's Great Lessons

Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to ...
Security: The Goodwill Virus That Keeps On Giving

Security: The Goodwill Virus That Keeps On Giving

The Goodwill Virus When Caitlyn Jenner officially introduced herself to the world by way of a Vanity Fair cover story ...