Principles of an Effective Cybersecurity Strategy

According to MetricStream’s, ‘The State of Cyber Security in the Financial Services Industry’ report, around 66 percent of financial services institutions have faced at least one cyber-attack in the last 12 months. The cost of this can even result in a complete shutdown of the business."

Vibhav Agarwal

Finally, The Time For Security Information Event Management (SIEM)

By Marc Malizia | March 2, 2016

The Time For SIEM Security Information Event Management (SIEM) tools have been around for a long time. My first encounter with a SIEM vendor was about twenty years ago while being courted to resell their product. To this day, I…

AWS Lambda – Future Of Amazon’s Event-Based Computing Service

By CloudTweaks | March 2, 2016

AWS Lambda – Amazon’s Event-Based Computing Service Announced in November of 2014, Amazon Lambda has gone from a developer buzzword to a heavyweight in the persistently innovative cloud computing industry. Used by organizations like Major League Baseball and live-streaming service…

How IRM Makes Cloud-Based File Collaboration “Security-Aware”

By Daren Glenister | March 1, 2016

IRM Cloud-Based File Collaboration  Data breaches and data loss due to insider threats, including malicious insiders stealing, manipulating or destroying data, are the fastest-growing risks that keep managers up at night, according to new research by Ernst & Young. How…

Built to Last: Choosing the Right Infrastructure Partner for Your Game

By CloudTweaks | October 23, 2017

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm Newzoo, they’ll drive roughly $108.9 billion in revenue for the industry by the end of this year. As video games…

Cisco to buy BroadSoft in $1.9 billion deal

By CloudBuzz | October 23, 2017

(Reuters) – Cisco Systems Inc (CSCO.O), the world’s largest networking gear manufacturer, said it will buy U.S. telecommunications software company BroadSoft Inc (BSFT.O) in a deal valued at about $1.9 billion, including debt. Cisco said it would offer $55 per…

Cloudera Speeds Analytics Deployment for Cybersecurity Hub

By CloudBuzz | October 23, 2017

New Service Simplifies Path to Deploying Next Generation Cybersecurity Hub, Making Machine Learning Easier and Accessible PALO ALTO, Calif., Oct. 23, 2017 /PRNewswire/ — Cloudera, Inc., (NYSE: CLDR), the modern platform for machine learning and analytics, optimized for the cloud,…

Treacherous 12: Top Threats to Cloud Computing + Industry Insights

By CloudBuzz | October 20, 2017

Top Threats to Cloud Computing SEATTLE, Oct. 20, 2017 /PRNewswire/ — The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment, today announced an updated ‘Treacherous 12:…

The Lighter Side Of The Cloud – The Money Grab

By David | October 20, 2017

By David Fletcher Please contact us for more information on how to license our comics for your next presentation, event, newsletter or website blog post.  ABOUT DavidDavid Fletcher was born in England in 1952. At school he excelled at drawing cartoons in…

POPULAR

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list ...
Fundamental Technology For An Autonomous Driving Future

Fundamental Technology For An Autonomous Driving Future

Driving Into The Autonomous Future Over-the-air (OTA) update capabilities are incredibly important to the automotive industry—in fact, they’re quite literally ...
The Tech Sector Gender Gap

The UK Tech Sector: The Gender Gap

The Tech Sector Gender Gap In conversation with Co-Founder and Creative Director of North West Web Design Studio, MadeByShape Andy ...
Social Media Continues To Shape Martech

Social Media Continues To Shape Martech

Social Media and Martech Martech and social media are inextricably linked and so it should come as no surprise that ...
AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility From Smokey the Bear

AWS S3 Outage & Lessons in Tech Responsibility Earlier this week, AWS S3 had to fight its way back to ...
What Is Two-Factor Authorization?

What Exactly Is Two-Factor Authorization?

What Is Two-Factor Authorization? Two-factor authorization. Most of us think we know what it is, but a recent news event ...
Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a ...
Chris Gerva

Vulnerability vs. Exploitability: Why they’re different & why it matters

Vulnerability vs. Exploitability There is a lot of jargon when it comes to cloud security. While the thought of having ...