Newsletter Subscribe

Bringing you thought leadership, news, infographics, resources and our own brand of comics each week to your inbox...

CloudTweaks Tech News and Resources Home

GreenTech and the Corporate Social Responsibility

A Corporate Culture Of Green In today’s business culture there is a new type of corporate strategy emerging, one that is becoming particularly prevalent in Silicon Valley – Corporate Social Responsibility. These green credentials are ...
Read More
/

Ransomware, Backups and the Aging IT Specialist

Small Business Cloud Right now, two technology trends characterize the small business ecosystem: a growing migration to the cloud, and a growing susceptibility to cybercrime, particularly in the form of ransomware. Recently, I discovered this ...
Read More
/

Blockchain Across All Industries

Blockchain Industries Blockchain, typically understood as the technology that powers the virtual currency bitcoin, in fact, provides market applications far beyond cryptocurrencies. It’s expected that the fintech industry will be the first area in which ...
Read More
/

Security Risks Lurk Behind Corporate Wearables Adoption

Security risks and wearables adoption Wearables makers were expected to sell 274.6 million devices in 2016, according to a Gartner report. Nearly three quarters of millennials, 71 percent, say their companies should give them wearables ...
Read More
/

5 Recommendations for Effective Governance, Risk and Compliance Management

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a ...
Read More
/

Business Applications for IOT

IoT Business IoT devices for the office are making their way into the limelight with digital assistants, security devices, and mobile workflow tools advancing swiftly. According to Gartner, by 2020 over 50% of major new ...
Read More
/
ENGLEWOOD CLIFFS, N.J., Feb. 21, 2017 /PRNewswire/ -- LG Electronics' webOS 3.5 Security Manager is the first smart TV platform certified for its effective cybersecurity capabilities by UL, one of the world's foremost experts in safety, security and sustainability. The webOS 3.5 Security Manager was tested for malware susceptibility and vulnerabilities, software weaknesses and security controls that help protect users' ...
Read More
Health Cloud Capabilities ORLANDO, FL. - 20 Feb 2017: At the 2017 Health Information Management Systems Society (HIMSS) conference in Orlando, IBM (NYSE: IBM) today introduced expanded capabilities for the Watson Platform for Health Cloud and a specialized Watson Health Consulting Services unit dedicated to helping clients and partners across the healthcare ecosystem capture the business opportunity of cognitive computing ...
Read More
Philips spotlights connected technology, predictive analytics software, and artificial intelligence advancing population health and precision medicine at HIMSS 2017 AMSTERDAM, Feb. 17, 2017 /PRNewswire/ -- Featuring new and enhanced connected health offerings at the 2017 HIMSS Conference & Exhibition (HIMSS17), Royal Philips (NYSE: PHG,AEX: PHIA), a global leader in health technology, will showcase a broad range of population health management, ...
Read More
Cupertino, California — Apple today announced its 28th annual Worldwide Developers Conference (WWDC) — hosting the world’s most talented developer community — will be held at the McEnery Convention Center in San Jose. The conference, kicking off June 5, will inspire developers from all walks of life to turn their passions into the next great innovations and apps that customers ...
Read More
When Cisco Systems Inc. reports earnings Wednesday, the big question will be if the networking giant’s repeated gambles on software can reverse a yearlong sales slide, or at least point to a reversal of that trend in the future. Cisco CSCO, +1.06%  is scheduled to report fiscal second-quarter earnings less than a month after announcing its latest multibillion-dollar software acquisition, ...
Read More

Opportunities and Pitfalls When Hiring a Chief Data Officer

The Chief Data Officer As part of their digital roadmap, organizations are increasingly taking advantage of big data and making analytics a core aspect of their business. Many of these underline the strategic importance by adopting their organizational structure, with 43% of enterprises having reorganized ...
Read More
Ransomware The vision is chilling. It's another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: "Your files have been captured and encrypted. To release them, you must pay." Ransomware has grown recently to become one of the primary threats to companies, governments and institutions worldwide ...
Read More
Connected Manufacturing A car is driven back to its home garage for the night, and its data port is plugged in. Then, some exciting things happen. First off, the car sends diagnostic information back to the manufacturer to cross-check against any systems that require repair, maintenance, or replacement. The manufacturer then downloads a selection of new driver experiences, including a ...
Read More
A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site's host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed to have been driven through ...
Read More
Defending the Organization When people talk about security audits in an organization, thoughts immediately go to malware, cyberattacks and other front line issues. These appear as the most obvious types of threats and are consequently given the greatest attention. As essential as these responses are, companies need additional layers of audit and defence further up the hierarchy if they are ...
Read More
threat-data
The Lurking Threat What is lurking inside your company’s systems that is making them vulnerable to attack? Hacking, phishing and other types of attacks are often considered to be externally driven, with gangs of anonymous hackers operating from halfway around the world using Internet connections to break in and wreak havoc. But surprisingly, a significant proportion of network security events ...
Read More

POPULAR

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it ...
Read More

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost ...
Read More

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their ...
Read More

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up ...
Read More

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated ...
Read More

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...
Read More

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model ...
Read More

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), ...
Read More

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating ...
Read More

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from ...
Read More