Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Chris Hughes GitGuardian Snyk
Cybersecurity Minute

Snyk and GitGuardian Partner to Secure Software Development, Reduce Risk

By Chris HughesJune 13, 2023

Snyk and GitGuardian, two prominent security tools providers, collaborate to tackle cloud-native security challenges and bolster cybersecurity measures.

Zero Trust Framework Featured
Cybersecurity

Why & How to Create a Zero-Trust Framework

By Robert WoodJune 12, 2023

This guidebook examines zero trust through the lens of business leaders and serves as a decision-making tool for creating a framework and implementing zero trust.

multi-cloud cybersecurity course
Cybersecurity

Acceleration Economy Course Preview: The Multi-Cloud and SaaS Cybersecurity Executive Buying Committee

By Tom SmithJune 12, 2023

Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on top business and tech drivers for multi-cloud and SaaS cybersecurity.

modern cloud erp
Cloud

Acceleration Economy Course Preview: The Modern Cloud ERP Executive Buying Committee

By Bob EvansJune 12, 2023

Get a preview of “Selling to the New Executive Buying Committee,” an Acceleration Economy Course on top business and tech drivers for modern Cloud ERP.

machine learning endpoint security
Cybersecurity

From Threat Detection to Reducing False Positives, ML Is Shaping Endpoint Security

By Robert WoodJune 5, 2023

Machine learning is impacting endpoint security in areas such as enhanced threat detection, false positivity reduction, and the ability to implement proactive security measures.

deepfakes
Cybersecurity

How the Rise of Deepfakes and New Technology Challenge Traditional Cybersecurity

By Robert WoodJune 2, 2023

Deepfakes challenge the traditional cybersecurity paradigms. Rob Wood explains how in this Generative AI Digital Summit moment.

Cybersecurity

Top 3 Ways to Explain End-Point Security to Business People

By Chris HughesJune 1, 2023

It’s essential that everyone in the workforce understand how to keep their mobile phones, laptops, and other endpoint devices secure, writes Chris Hughes.

Cybersecurity

How AI Enhances Endpoint Detection and Response (EDR) for Stronger Cybersecurity

By Bill DoerrfeldMay 31, 2023

Bill Doerrfeld explains how AI is improving endpoint threat detection and accelerating response times.

Cybersecurity Minute

How Strong Endpoint Security Enhances Reputation and Builds Customer Trust

By Frank DomizioMay 30, 2023

Cyber attacks pose financial and reputational risks, which necessitate investment in strong endpoint security defenses.

generative AI cybersecurity
AI and Copilots

How Generative AI and Behavioral Analytics Bolster Cybersecurity

By Frank DomizioMay 30, 2023

From a security perspective, AI can be used against itself within the realm of behavioral analytics and malware detection.

endpoint security
Cybersecurity

How to Optimize Endpoint Security for Laptops and Mobile Phones

By Frank DomizioMay 30, 2023

Robust encryption, access controls, and user education help CISOs mitigate the risks of theft, insider threats, and cyber attacks against their organizations.

endpoint security zero trust
Cybersecurity

How to Implement Zero Trust For Remote Endpoints in the Enterprise

By Chris HughesMay 28, 2023

Implementation of zero trust security for geographically distributed endpoints is critical in the age of remote work.

IBM WatsonX Innovation Profile Kenny Mullican
AI and Copilots

Innovation Profile: How IBM watsonx Helps Organizations Manage Data, AI, and Governance

By Kenny MullicanMay 26, 2023

In this profile originally featured at the Generative Ai Digital Summit, Kenny Mullican dives into IBM’s new enterprise-ready data and AI platform watsonx.

AI and Copilots

Innovation Profile: How the Endor Labs Platform Leverages Generative AI for Cybersecurity

By Kieron AllenMay 26, 2023

The updated Endor Labs platform lets cybersecurity users assess open-source software using natural language search.

The Ethical & Workforce Impacts of Generative AI_featured
AI and Copilots

The Ethical and Workforce Impacts of Generative AI

By Toni WittMay 26, 2023

This guidebook will help you see how generative AI can benefit your business while avoiding the pitfalls that come with adoption, all backed by practitioner guidance.

Cybersecurity Minute

How the Intersection of Machine Learning (ML), Endpoint Security Transforms Cybersecurity

By Robert WoodMay 26, 2023

Machine learning is nothing new in cybersecurity, but in recent years, it’s gotten significantly better, says Rob Wood.

Cybersecurity

8 Tangible Ways — Including Least Privilege — to Secure Event-Driven Software Architecture

By Bill DoerrfeldMay 25, 2023

EDA delivers numerous benefits in flexibility, scalibility, and responsiveness, but it also carries unique security considerations.

Cybersecurity

How Data Quality Leads to Effective Machine Learning (ML) Models in Cybersecurity

By Robert WoodMay 25, 2023

Rob Wood explains why cybersecurity ML models need clean and ample data, proper input ranges, and robust data platforms, such as the security data lake.

Rubrik data
Data

How Rubrik Delivers Best-in-Class Data Resilience, Observability, and Remediation

By Kieron AllenMay 24, 2023

The Rubrik management platform provides data resilience, observability, and remediation. Find out what differentiates Rubrik.

Acceleration Economy Introduces Practitioner Analyst Courses
AI and Copilots

Acceleration Economy Introduces Practitioner Analyst Courses

By John SiefertMay 24, 2023

Acceleration Economy Practitioner Analyst Courses, a new on-demand continuing education and training framework delivered by AI, business, IT, cybersecurity, and data practitioners, will debut June 5, 2023.

Previous 1 … 8 9 10 11 12 … 45 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.