Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Cloud Data Strategy, Analytics & Governance_featured
Data

Cloud Data Strategy, Analytics, and Governance

By Wayne SadinFebruary 27, 2023

Organizations aiming to be “data intelligent” must have a foundation of data governance in place that spans all facets of the business. Why? Customer dazzle which leads to revenue growth.

security data centralization
Cybersecurity

Why Cybersecurity Teams Should Centralize Their Data for Better Threat Detection

By Robert WoodFebruary 27, 2023

Security data often ends up distributed across many systems, which can be an issue when searching for threats. CISO Rob Wood advocates a more centralized approach.

data silos
Cybersecurity

Why Data Silos Create Cybersecurity Risks and How to Break Them Down

By Robert WoodFebruary 27, 2023

Robert Wood discusses the risks of data silos and provides three actionable steps for how to break them down or control their impact.

sensitive data
Cybersecurity

From PII to Passwords: How CISOs Deploy Cybersecurity Tools to Protect Sensitive Data

By Frank DomizioFebruary 26, 2023

Knowing the types of data that cybercriminals target for identity theft, financial fraud, or other malicious activities helps security teams implement effective protection.

data-driven teams cybersecurity rob wood
Cybersecurity

How Brainstorming With Data-Driven Teams Can Expedite Cybersecurity Outcomes

By Robert WoodFebruary 24, 2023

Insights from data-driven teams include application telemetry and debugging logs, which can be invaluable from a security standpoint.

Cloud

Why Cybersecurity Hygiene Is So Critical in Multi-Cloud Environments

By Chris HughesFebruary 24, 2023

Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.

generative AI data security risk
Data Modernization Minute

How to Manage Data Security Risks Spawned by Generative AI

By Wayne SadinFebruary 23, 2023

With the rise of generative AI, companies with weak data exfiltration controls are at even more risk of inadvertent disclosure of data, explains Wayne Sadin.

GitGuardian
Acceleration Economy Minute

How GitGuardian Locks Down Secrets in GitHub Repositories

By Kieron AllenFebruary 23, 2023

GitGuardian addresses a critical and widespread problem: developers storing secrets, such as API keys, in repositories where they can be visible to nefarious actors.

Screengrab from podcast about increasing cybersecurity awareness among employees
Cloud

Yes, the Military Really Uses ‘Top Secret’ Folders: Cultivating Cybersecurity Awareness | Anschuetz on Leadership

By Cloud Wars LiveFebruary 22, 2023

Christian Anschuetz and Bob Evans look at the biggest cybersecurity risk for organizations—human error—and discuss how to increase awareness.

CockroachDB Dedicated - Cockroach Labs
Acceleration Economy Minute

How New Cockroach Database Release Simplifies Payment Card Standard Compliance

By Kieron AllenFebruary 22, 2023

Kieron Allen highlights how CockroachDB Dedicated is PCI-DSS certified, making it easier for customers to protect payment card information.

conway's law
Cybersecurity

How ‘Conway’s Law’ Highlights the Impact of Organizational Silos on Cybersecurity

By Robert WoodFebruary 22, 2023

Conway’s Law is a useful lens through which to examine security in large organizations, says analyst Robert Wood, noting that silos introduction friction.

low code multi-cloud strategy
Cybersecurity

How Low-Code Enables Orchestration, Governance in a Multi-Cloud Architecture

By Bill DoerrfeldFebruary 22, 2023

Bill Doerrfeld breaks down the benefits of low-code and multi-cloud and explains how low code can address key multi-cloud challenges.

AI partners
Hyperautomation Minute

How Partners Can Guide Customers to Build AI Apps That Streamline Operations

By Janet SchijnsFebruary 21, 2023

Janet Schijns defines how AI apps, supported by partners, can automate everything from repetitive tasks to supply chains for better operational efficiency.

GitGuardian
Cybersecurity

How GitGuardian Secures Source Code With Its Secret Detection Engine for DevSecOps

By Kieron AllenFebruary 21, 2023

GitGuardian, a Cybersecurity Top 10 Shortlist company, offers a secrets detection platform that ensures source-code security for the DevSecOps era.

sensitive data
Cybersecurity Minute

How Business Units Can Work With CISOs to Protect Sensitive Data

By Frank DomizioFebruary 20, 2023

Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.

SaaS and PaaS
Cybersecurity Minute

Why Uniting Diverse Logs Into a Dashboard Facilitates Cybersecurity Investigations

By Robert WoodFebruary 17, 2023

Robert Wood explains how a linear dashboard view of logs that aligns with SaaS and PaaS providers can lead to more effective cybersecurity investigations.

artificial intelligence security
Cybersecurity

How AI Creates a Cybersecurity Force Multiplier, Identifying and Responding to Threats

By Frank DomizioFebruary 16, 2023

Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.

data modernization csuite
Data

CEO, CIO, CISO, and CDO Roundtable on Data Modernization

By John SiefertFebruary 15, 2023

John Siefert, Wayne Sadin, Chris Hughes, and John Muehling discuss why data modernization needs require C-suite execs to collaborate.

Cloud Security Usage
Cybersecurity Minute

How Sysdig Cloud Security Report Calls Out Zero-Trust Disconnect, Misconfiguration Risks

By Chris HughesFebruary 14, 2023

Acceleration Economy analyst Chris Hughes breaks down the latest findings from Sysdig’s 2023 Cloud-Native Security and Usage report.

CTO cloud migration
Data

Why Prioritize Cloud Migration? Try Security, Scalability, and Cutting Technical Debt

By Wayne SadinFebruary 14, 2023

Wayne Sadin delves into the advantages of cloud migration and why CTOs should make it a priority.

Previous 1 … 19 20 21 22 23 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }