Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
strategic threat intelligence rob wood
Cybersecurity Minute

How a Proactive Approach to Strategic Threat Intelligence Strengthens Cybersecurity

By Robert WoodApril 26, 2023

Strategic threat intelligence can be used to prepare for future threats, and an organization’s strategy should be adopted accordingly.

Lookout MSSPs
Cybersecurity

How Lookout Enables MSSPs to Protect Mobile Endpoints at Scale

By Tom SmithApril 25, 2023

New service built specifically for managed security service providers (MSSPs) help them secure the most common mobile devices and encourages self-remediation when issues occur.

tactical threat intelligence
Cybersecurity

How To Build Tactical Threat Intelligence and Identify Cybersecurity Risks Proactively

By Frank DomizioApril 24, 2023

Tactical threat intelligence is gathering, analyzing, and sharing data to find cyber threats and figure out how to deal with them. Learn how to set up a program.

Cybersecurity

How Endor Labs Applies Generative AI to Secure Open-Source Software Development

By Kieron AllenApril 24, 2023

With DroidGPT, Endor Labs applies generative AI to software development to ensure open-source packages are current and secure.

HIMSS 2023 Paul Swider
AI and Copilots

On Location at HIMSS: How Oracle, Zoom, and Microsoft Transform Healthcare With Partnerships, AI

By Paul SwiderApril 21, 2023

In this special “on location” minute, Paul Swider shares his impressions from the third day of the HIMSS 2023 Global Health Conference and Exhibition in Chicago.

Cybersecurity Minute

How Threat Intelligence Maintains Cybersecurity in a Multi-Cloud Environment

By Frank DomizioApril 20, 2023

Threat intelligence gathers and utilizes data about potential threats to keep corporate data safe. It’s especially useful in a multicloud scenario.

generative AI risk
Cybersecurity

How Cybersecurity Teams Can Identify and Manage Generative AI Risk

By Robert WoodApril 20, 2023

Rob Wood explores how organizations should think about generative AI models from a risk perspective, with a special focus on the conversations between security leaders and the C-suite.

Digital Transformation
CXO Minute

Why Digital Transformation, Cybersecurity, and Data Modernization Are Top Priorities

By Tony UphoffApril 19, 2023

Tony Uphoff shares his five top takeaways from the recent Digital CIO Summit, recommending some relevant on-demand sessions along the way.

Cybersecurity Minute

How Cybersecurity Policies and Training Mitigate Generative AI Risk

By Robert WoodApril 19, 2023

Generative AI’s rapid rise makes it imperative for security teams to establish policy frameworks and guardrails in order to mitigate risk.

cybersecurity business enabler
Innovation & Leadership

Why Cybersecurity Must Evolve to Be a Business Enabler

By John SiefertApril 19, 2023

The latest Growth Swarm podcast covers cybersecurity as a business enabler from the CEO perspective, the CMO perspective, and the industry perspective.

Cybersecurity Minute

How Microsoft Security Copilot Brings Generative AI to Cybersecurity Tooling

By Chris HughesApril 18, 2023

The release of Microsoft’s Security Copilot is only the beginning of generative AI use cases for cybersecurity tooling, says Chris Hughes.

cloud data governance
Cybersecurity

How Cybersecurity Leaders Can Capitalize on Cloud and Data Governance Synergy

By Chris HughesApril 18, 2023

Chris Hughes explains what this synergy means for businesses as they continue to move to the cloud and accumulate data to drive business decisions and outcomes.

Cybersecurity Minute

Why Security Teams Must Be Prepared for Deepfakes

By Robert WoodApril 17, 2023

ChatGPT may be getting a lot of attention, but generative AI-powered deepfakes have been around for a while, and security teams can’t forget this riskier side of the technology, says Rob Wood.

HIMSS
Innovation & Leadership

On Location at HIMSS: How Microsoft Champions Social Determinants of Health (SDOH), Responsible AI

By Paul SwiderApril 17, 2023

Microsoft’s updates to its Azure AI Services for Health and Healthcare Cloud, set to be previewed at the HIMSS conference this week, signal a transformative leap forward.

self-service data access
Cybersecurity

How to Balance Self-Service Data Access With Centralized Governance

By Chris HughesApril 17, 2023

A self-service data access model is key to enabling a business to take advantage of valuable information, but it must be implemented in a fashion that ensures fundamental security controls.

Workday Ethical AI
Innovation & Leadership

How Workday Helps Shape Regulations for Operationalizing AI in Ethical Ways

By Aaron BackApril 17, 2023

In this Digital CIO Summit Moment, excerpted from a session on ethical AI, Workday’s Shane Luke discusses his company’s approach to AI implementation and regulation.

threat intelligence lifecycle
Cybersecurity

How to Deploy the Threat Intelligence Lifecycle for Enhanced Cybersecurity

By Frank DomizioApril 14, 2023

Knowledge is power, and in the world of cybersecurity, the threat intelligence lifecycle is key to unlocking that power.

data quality
Innovation & Leadership

How to Improve Data Quality and Culture for Strong Business Outcomes

By Kenny MullicanApril 14, 2023

Data quality impacts decision-making, efficiency, productivity, and customer experience; all business leaders must assign it a high priority.

citizen data scientists
Data Modernization Minute

How To Collaborate and Drive Outcomes Amid the Rise in Citizen Data Scientists

By Wayne SadinApril 14, 2023

End users with little to no IT background can learn data engineering and data science with the help of low-code/no-code platforms, but they must understand foundational aspects of the fields to avoid creating messy situations.

automating business processes
Innovation & Leadership

How Applying AI, Automation to Business Processes Benefits Customers

By Bob EvansApril 14, 2023

John Granger, SVP, IBM Consulting, explains how automating business processes can deliver beneficial outcomes and create opportunities.

Previous 1 … 12 13 14 15 16 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }