Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
generative ai partners ecosystem
Innovation & Leadership

How Generative AI Enables Partners to Accelerate Development, Innovation

By Janet SchijnsMay 13, 2023

While generative AI is still a relative newcomer in the channel, it’s already starting to create an impact in several ways.

data-driven cybersecurity teams
Cybersecurity

How Threat Intelligence Streamlines Operational Tasks For Data-Driven Cybersecurity

By Robert WoodMay 12, 2023

Leveraging threat intelligence for operational needs can make organizations more effective and adaptable in modern cybersecurity operations.

Cybersecurity Minute

How the Microsoft DevOps Threat Matrix Helps Optimize Cybersecurity

By Chris HughesMay 11, 2023

The new resource provides intelligence on malicious actors and attack vectors, especially those used in recent software supply chain attacks.

Analysts
Cybersecurity

Why Cybersecurity Teams Need an Incident Coordinator

By Frank DomizioMay 11, 2023

A communications point person is essential after a breach; they keep everyone in the loop, enabling cybersecurity folks to focus on cybersecurity.

Partners Ecosystem

How Working With Multiple Partners Helps Align Cloud and Cybersecurity Strategies

By Janet SchijnsMay 11, 2023

Working with multiple partners delivers the best outcomes for enterprises looking to integrate critical elements of modern business infrastructure.

IBM Think 2023 AI Kenny Mullican
AI and Copilots

On Location at IBM Think: How Watsonx Will Drive Safe and Effective Enterprise AI Use

By Kenny MullicanMay 10, 2023

From watsonx and will.i.am to co-creation and creativity, the first-day news, topics, and presentations at IBM Think were timely and thought-provoking, says Kenny Mullican.

Cybersecurity Minute

How Cyber Threat Intelligence Prevents Data Breaches

By Frank DomizioMay 10, 2023

Organizations need to invest in the right people, processes, and technologies to protect themselves from online threats in particular.

analysts and lookout
Cybersecurity

How Data Loss Prevention Helps Implement Uniform Security Policies in SaaS Applications

By John SiefertMay 10, 2023

Lookout Chief Strategy Officer Aaron Cockerill explains how DLP helps CEOs and CISOs optimize cybersecurity in SaaS environments.

CI/CD pipeline
Cybersecurity

How to Mitigate Cybersecurity Risks in Your CI/CD Pipeline

By Bill DoerrfeldMay 10, 2023

Bill Doerrfeld analyzes the state of modern CI/CD security, reviews the most common risks, and offers some safeguarding suggestions.

ESG Microsoft
AI and Copilots

How an ESG Lens Helps Mitigate Risk and Bias in AI Implementation

By Tony UphoffMay 9, 2023

In this CIO Summit moment, Microsoft WW Sustainability Industry Advocate Matthew Sekol discusses the intersection of sustainability, risk, and ESG.

IBM Think 2023 preview Kenny Mullican
Innovation & Leadership

On Location: IBM Think 2023 Preview

By Kenny MullicanMay 9, 2023

On location in Orlando at IBM’s annual conference, Kenny Mullican shares his short list of conference highlights this week in this preview.

CISO Briefing
Cybersecurity

CISO Cybersecurity Briefing

By Aaron BackMay 8, 2023

A briefing featuring three CISO Practitioner Analysts discussing the state of the market, CISO priorities, Multi-Cloud Cybersecurity, SaaS Security, and the impact of Generative AI.

Cybersecurity Minute

How to Forecast Risk With Strategic Threat Intelligence

By Robert WoodMay 8, 2023

Contextualizing your organization’s key risks and general technology trends with peers is the best way to prepare against future security threats.

RSA conference
Cybersecurity

On Location at RSA: How Conference Networking, Integrated Solutions Keep Complex Technologies Secure

By Robert WoodMay 5, 2023

Networking opportunities and the need for integrated solutions were crucial takeaways of RSA 2023, along with the increasing complexity of the cybersecurity landscape.

Generative AI Digital Summit
AI and Copilots

Acceleration Economy Practitioner Analysts Announce Generative AI Digital Summit featuring Google & Microsoft

By John SiefertMay 4, 2023

Acceleration Economy along with Google and Microsoft introduce the Generative AI Digital Summit, featuring insights from industry leaders and practitioner analysts.

CIO Cybersecurity
Innovation & Leadership

Why People Are the Top Cybersecurity Concern for Former Federal Deputy CIO Maria Roat

By Tony UphoffMay 4, 2023

Excerpted from the session on “AI, Cybersecurity, and Innovation,” this CIO Digital Summit moment features a cautionary tale about what caused a security breach at the SBA.

Financial Automation
Cybersecurity Minute

Why More Data Sometimes Adds Cybersecurity Risk in Financial Automation

By Robert WoodMay 4, 2023

Cybersecurity teams must work closely with finance teams to help them determine what kind of data is essential for automation to deliver more benefits than risk.

GitGuardian Supply Chain
Cybersecurity

How GitGuardian ‘Honeytoken’ Issues Alerts for Software Supply Chain Attacks

By Kieron AllenMay 4, 2023

Cybersecurity vendor GitGuardian launches a new module aiming to draw software supply chain intruders in, then capture their information.

Cybersecurity Minute

How to Handle the Fear and Uncertainty Around AI in Cybersecurity

By Robert WoodMay 3, 2023

Fear, uncertainty, and doubt (FUD) surround AI in cybersecurity, and practitioners need to have proactive conversations to combat it.

Cybersecurity

How Tactical Threat Intelligence Mitigates Business Risk by Targeting Malware

By Chris HughesMay 3, 2023

In this analysis, Chris Hughes explores a subset of threat intelligence that focuses on malware and specific behavioral threat indicators for malicious actors.

Previous 1 … 11 12 13 14 15 … 47 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }