Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
hardcoded secrets
Cybersecurity

Why We Need Cybersecurity Automation to Mitigate Risk from Hard-Coded Secrets

By Robert WoodJune 22, 2023

Manual code reviews have limitations in addressing the risks of hard-coded secrets, leading to a critical need for automated analysis in securing the software development process.

Cybersecurity Minute

How the Cybercrime Atlas Initiative — Backed by Fortinet — Combats Global Security Threats

By Frank DomizioJune 21, 2023

The Cybercrime Atlas is a collaborative effort involving businesses, law enforcement agencies, and researchers to combat cybercrime and strengthen global defenses against cyber threats.

Trend Micro cloud security
Acceleration Economy Minute

Trend Micro Forecast: Security Operations Centers (SOCs) to Absorb Cloud Security

By Kieron AllenJune 20, 2023

Trend Micro predicts that cloud security will be absorbed into overall security operations, following a familiar trend with past innovations.

Multi-cloud and SaaS cybersecurity
Cybersecurity

Acceleration Economy Course Preview: The Multi-Cloud and SaaS Cybersecurity Executive Buying Committee (Part 3)

By Tom SmithJune 20, 2023

Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on vendor selection criteria for multi-cloud and SaaS cybersecurity.

multi-cloud SaaS cybersecurity course 2
Cybersecurity

Acceleration Economy Course Preview: The Multi-Cloud and SaaS Cybersecurity Executive Buying Committee (Part 2)

By Tom SmithJune 19, 2023

Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on mitigating multi-cloud and SaaS cybersecurity risk while enabling the business.

Rob Wood discusses secrets sprawl
Cybersecurity Minute

How Cybersecurity Practitioners Tap Automation to Address Secrets Sprawl

By Robert WoodJune 18, 2023

Secrets sprawl is a pervasive problem in software security. Acceleration Economy analyst Rob Wood explains how to use automation to prevent exposed secrets in your applications.

Frank Domizio explains ways to prevent employment identity theft
Cybersecurity Minute

What to Look For in Employment Identity Theft Protection Tools

By Frank DomizioJune 16, 2023

Employment identity theft is a growing concern for individuals and businesses. Learn how to protect yourself and your organization from becoming a victim.

Snyk security
Acceleration Economy Minute

Snyk Provides Developer-Focused Security to Reduce Customers’ Risk Exposure

By Kieron AllenJune 15, 2023

Snyk provides developer-focused security for companies across every sector, enabling ongoing security improvements including reduced risk exposure.

Snyk security
Cybersecurity

How Snyk Provides Comprehensive Developer and Application Security

By Kieron AllenJune 15, 2023

The cybersecurity innovator Snyk caters to developers, ensuring that their code is secure as it’s written, and that their open-source software is monitored continuously.

Snyk GitGuardian AI
Cybersecurity Minute

Snyk Leverages AI for Cybersecurity Risk Reduction

By Chris HughesJune 14, 2023

Snyk shifts security left with its Deep Code AI Fix, a proprietary AI engine that automates security fixes for developers, enabling risk reduction and addressing vulnerabilities in cybersecurity.

snyk gitguardian
Cybersecurity

GitGuardian, Snyk Empower Developers and Enhance Cloud-Native Cybersecurity

By Chris HughesJune 14, 2023

GitGuardian and Snyk join forces to strengthen cloud-native security, enhance their developer-centric approach, and drive early risk mitigation in software development.

Chris Hughes GitGuardian Snyk
Cybersecurity Minute

Snyk and GitGuardian Partner to Secure Software Development, Reduce Risk

By Chris HughesJune 13, 2023

Snyk and GitGuardian, two prominent security tools providers, collaborate to tackle cloud-native security challenges and bolster cybersecurity measures.

Zero Trust Framework Featured
Cybersecurity

Why & How to Create a Zero-Trust Framework

By Robert WoodJune 12, 2023

This guidebook examines zero trust through the lens of business leaders and serves as a decision-making tool for creating a framework and implementing zero trust.

multi-cloud cybersecurity course
Cybersecurity

Acceleration Economy Course Preview: The Multi-Cloud and SaaS Cybersecurity Executive Buying Committee

By Tom SmithJune 12, 2023

Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on top business and tech drivers for multi-cloud and SaaS cybersecurity.

modern cloud erp
Cloud

Acceleration Economy Course Preview: The Modern Cloud ERP Executive Buying Committee

By Bob EvansJune 12, 2023

Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on top business and tech drivers for modern Cloud ERP.

machine learning endpoint security
Cybersecurity

From Threat Detection to Reducing False Positives, ML Is Shaping Endpoint Security

By Robert WoodJune 5, 2023

Machine learning is impacting endpoint security in areas such as enhanced threat detection, false positivity reduction, and the ability to implement proactive security measures.

deepfakes
Cybersecurity

How the Rise of Deepfakes and New Technology Challenge Traditional Cybersecurity

By Robert WoodJune 2, 2023

Deepfakes challenge the traditional cybersecurity paradigms. Rob Wood explains how in this Generative AI Digital Summit moment.

Cybersecurity

Top 3 Ways to Explain End-Point Security to Business People

By Chris HughesJune 1, 2023

It’s essential that everyone in the workforce understand how to keep their mobile phones, laptops, and other endpoint devices secure, writes Chris Hughes.

Cybersecurity

How AI Enhances Endpoint Detection and Response (EDR) for Stronger Cybersecurity

By Bill DoerrfeldMay 31, 2023

Bill Doerrfeld explains how AI is improving endpoint threat detection and accelerating response times.

Cybersecurity Minute

How Strong Endpoint Security Enhances Reputation and Builds Customer Trust

By Frank DomizioMay 30, 2023

Cyber attacks pose financial and reputational risks, which necessitate investment in strong endpoint security defenses.

Previous 1 … 8 9 10 11 12 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }