Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
automated vulnerability dection
Cybersecurity

How Automated Vulnerability Detection Mitigates Fraud and Hardens Financial Systems

By Bill DoerrfeldMarch 20, 2023

An in-depth look at automated vulnerability scanning within financial software, how it works, as well as top tools and best practices to get the job done.

compliance multi-cloud
Cybersecurity

Why Investing in Compliance Training Is Crucial for Multi-Cloud Environments

By Robert WoodMarch 17, 2023

Rob Wood explains why security teams need to be trained to assess risk and maintain compliance across different clouds.

ERP Process Automation
AI and Copilots

From Streamlining Accounts Payable (AP) to Fighting Fraud, How ERP Automation Pays Off

By Kenny MullicanMarch 17, 2023

As the pace of business accelerates, automating ERP processes helps companies remain competitive and achieve long-term success, says Kenny Mullican.

zero trust journey
Cybersecurity

Why Zero Trust Is a Cybersecurity Journey and How to Realize Continuous Improvement

By Frank DomizioMarch 17, 2023

Effective zero trust requires a comprehensive understanding of the organization’s security landscape, a risk-based approach, and a commitment to continuous improvement. Learn how to manage the journey.

CIO CISO relationship
Innovation & Leadership

Road to CIO Summit: How the CIO-CISO Relationship Has Grown More Collaborative

By Aaron BackMarch 16, 2023

Rob Wood and Aaron Back explore the evolving relationship between CIOs and CISOs and discuss the importance of sharing customer stories.

endor labs top 10 risks
Cybersecurity

How Endor Labs Research Defines State of Open-Source Vulnerabilities

By Chris HughesMarch 16, 2023

Endor Labs released a report that identifies the top 10 open source software risks, including known vulnerabilities, compromised legitimate packages, untracked dependencies, and more. Chis Hughes explains.

process mining data governance
Cybersecurity

How to Ensure Process Mining App Security — Including Authentication, APIs, and Data

By Bill DoerrfeldMarch 16, 2023

Process mining offers great opportunity to fine-tune business processes but also introduces potential risks, which can be mitigated with strong governance measures.

security training
Cybersecurity Minute

Why Leaders Must Vary Cybersecurity Training Methods for Multi-Cloud

By Robert WoodMarch 15, 2023

To get the most out of training for multi-cloud environments, it’s important to vary the kinds of training offered to suit different learning styles, according to analyst Rob Wood.

Data Modernization and Multi-Cloud Kieron Allen Road to CIO Summit
Innovation & Leadership

Road to CIO Summit: How Multi-Cloud, Data Modernization Sessions Deliver Unique Insights

By Aaron BackMarch 14, 2023

Hearing fellow analysts collectively discuss key technology pillars will provide unique insights, says Kieron Allen in this CIO Summit event preview.

AI Data Governance
Innovation & Leadership

How AI Strengthens Data Governance and Increases Your Data’s Value

By Scott VaughanMarch 14, 2023

How organizations can balance their expanding use of AI against the need to manage the data governance process — while increasing the value and velocity of data.

multi-cloud training security
Cybersecurity

How to Reduce Multi-Cloud Data Risk With Cybersecurity Training 

By Robert WoodMarch 14, 2023

Multi-cloud environments come with unique challenges, and analyst Rob Wood provides best practices for reducing security threats through training for employees with access to cloud resources.

How to Secure Multi-Cloud
Cybersecurity

Practitioner Playlist: How to Secure Multi-Cloud

By Chris HughesMarch 13, 2023

This playlist defines the Why & How of creating a Comprehensive Multi-Cloud security strategy, which is critical in today’s accelerated economy.

Defining ChatGPT and Generative AI
AI and Copilots

Practitioner Playlist: Defining ChatGPT & Generative AI

By Wayne SadinMarch 13, 2023

The use of Generative AI and ChatGPT enables business acceleration, yet comes with security implications. The need for governance and “guardrails” is critical.

Cybersecurity

Why Zero Trust Is an Effective Defense Against Evolving Attackers

By Frank DomizioMarch 13, 2023

The zero trust security framework can protect sensitive data from evolving cyber threats, says Frank Domizio.

Fortinet
Acceleration Economy Minute

How Fortinet Uses Training, Services to Address Cybersecurity Skills Shortage

By Kieron AllenMarch 13, 2023

With new training and services, Fortinet aims to help customers bolster their cybersecurity team skills and address the skills shortage that can slow teams down.

machine learning cybersecurity
Cybersecurity

How Cybersecurity Pros Can Stop Malicious Actors Looking to Exploit ML

By Chris HughesMarch 13, 2023

Machine learning comes with many benefits for cybersecurity, but cutting-edge bad actors are looking to exploit ML for their own gain. Chris Hughest explains how to fight “adversarial ML.”

zero trust frameworks
Cybersecurity

How to Ensure Zero Trust Keeps Pace With Attackers’ Fast-Evolving Techniques

By Frank DomizioMarch 11, 2023

Frank Domizio explains why cybersecurity professionals must continuously be on the lookout for ways in which the zero trust security model could become vulnerable to ever-evolving attackers.

cognitive load multi-cloud
Cybersecurity

Why a Multi-Cloud Security Strategy Needs Proper Management of Cognitive Load

By Robert WoodMarch 10, 2023

There’s a lot of complexity that goes into managing different cloud services. Here’s what you need to know before embarking away from a single cloud setup.

compliance cybersecurity
Cybersecurity

How to Improve Cybersecurity Compliance With Real-Time Data and Automation

By Bill DoerrfeldMarch 10, 2023

Bill Doerrfeld explains reveals why old-fashioned compliance practices can’t guarantee successful outcomes; real-time data and automation can help.

How to Protect Critical Data
Data

Practitioner Playlist: How to Protect Critical Data

By Chris HughesMarch 9, 2023

This playlist features content centered on the importance of a strong security foundation in a data strategy.

Previous 1 … 16 17 18 19 20 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }