Newsletter Subscribe

Bringing you thought leadership, news, infographics, resources and our own brand of comics each week to your inbox...

CloudTweaks Tech News and Resources Home

The Deep and Dark Web

The Dark Web The Deep and Dark Web, hidden in the depths of the internet, sounds like something out of a nail-biting thriller, but is, in fact, a very real part of our world. Just ...
Read More
/

How To Be Data Compliant When Using The Cloud

Data compliant Companies using the cloud for data storage, applications hosting or anything else, have to carefully consider data compliance. Governance, risk management and compliance professionals, as well as managers of information security, need to ...
Read More
/

GreenTech and the Corporate Social Responsibility

A Corporate Culture Of Green In today’s business culture there is a new type of corporate strategy emerging, one that is becoming particularly prevalent in Silicon Valley – Corporate Social Responsibility. These green credentials are ...
Read More
/

Ransomware, Backups and the Aging IT Specialist

Small Business Cloud Right now, two technology trends characterize the small business ecosystem: a growing migration to the cloud, and a growing susceptibility to cybercrime, particularly in the form of ransomware. Recently, I discovered this ...
Read More
/

Blockchain Across All Industries

Blockchain Industries Blockchain, typically understood as the technology that powers the virtual currency bitcoin, in fact, provides market applications far beyond cryptocurrencies. It’s expected that the fintech industry will be the first area in which ...
Read More
/

Security Risks Lurk Behind Corporate Wearables Adoption

Security risks and wearables adoption Wearables makers were expected to sell 274.6 million devices in 2016, according to a Gartner report. Nearly three quarters of millennials, 71 percent, say their companies should give them wearables ...
Read More
/
Users empowered with a refined, mobile-first, fully-integrated communications platform accessible from any browser, device or desktop SANTA CLARA, CA--(Marketwired - February 22, 2017) - Avaya today announced the general availability of the industry's first real unified communications (UC) solution, Avaya Equinox. Avaya Equinox delivers simple, mobile-first communications on the devices, and embedded into the applications and browsers, that employees "live ...
Read More
ENGLEWOOD CLIFFS, N.J., Feb. 21, 2017 /PRNewswire/ -- LG Electronics' webOS 3.5 Security Manager is the first smart TV platform certified for its effective cybersecurity capabilities by UL, one of the world's foremost experts in safety, security and sustainability. The webOS 3.5 Security Manager was tested for malware susceptibility and vulnerabilities, software weaknesses and security controls that help protect users' ...
Read More
Health Cloud Capabilities ORLANDO, FL. - 20 Feb 2017: At the 2017 Health Information Management Systems Society (HIMSS) conference in Orlando, IBM (NYSE: IBM) today introduced expanded capabilities for the Watson Platform for Health Cloud and a specialized Watson Health Consulting Services unit dedicated to helping clients and partners across the healthcare ecosystem capture the business opportunity of cognitive computing ...
Read More
Philips spotlights connected technology, predictive analytics software, and artificial intelligence advancing population health and precision medicine at HIMSS 2017 AMSTERDAM, Feb. 17, 2017 /PRNewswire/ -- Featuring new and enhanced connected health offerings at the 2017 HIMSS Conference & Exhibition (HIMSS17), Royal Philips (NYSE: PHG,AEX: PHIA), a global leader in health technology, will showcase a broad range of population health management, ...
Read More
Cupertino, California — Apple today announced its 28th annual Worldwide Developers Conference (WWDC) — hosting the world’s most talented developer community — will be held at the McEnery Convention Center in San Jose. The conference, kicking off June 5, will inspire developers from all walks of life to turn their passions into the next great innovations and apps that customers ...
Read More

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the ...
Read More
Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As essential as these responses are, companies need additional layers of audit and defence further up the hierarchy if they are ...
Read More
Moving Test and Dev to the Cloud Have you ever seen the old parlor trick in which a person pulls a tablecloth out from under a fully set table without disturbing a single item of cutlery or glassware? It's something that comes to mind for many IT managers and engineers tasked with the job of evolving their network environments while ...
Read More
Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: "Your files have been captured and encrypted. To release them, you must pay." Ransomware has grown recently to become one of the primary threats to companies, governments and institutions worldwide ...
Read More
A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site's host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed to have been driven through ...
Read More
Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of new driver experiences, including a ...
Read More

POPULAR

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), ...
Read More

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the ...
Read More

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide ...
Read More

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not ...
Read More

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is ...
Read More

What You Need To Know About Choosing A Cloud Service Provider

Selecting The Right Cloud Services Provider How to find the right partner for cloud adoption on an enterprise scale The ...
Read More

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up ...
Read More

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and ...
Read More

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and ...
Read More

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information ...
Read More

Noteworthy Resources