Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Cloud

Why Cybersecurity Hygiene Is So Critical in Multi-Cloud Environments

By Chris HughesFebruary 24, 2023

Nearly all cloud security incidents are due to customer misconfigurations. Chris Hughes explains how cybersecurity hygiene addresses the problem.

generative AI data security risk
Data Modernization Minute

How to Manage Data Security Risks Spawned by Generative AI

By Wayne SadinFebruary 23, 2023

With the rise of generative AI, companies with weak data exfiltration controls are at even more risk of inadvertent disclosure of data, explains Wayne Sadin.

GitGuardian
Acceleration Economy Minute

How GitGuardian Locks Down Secrets in GitHub Repositories

By Kieron AllenFebruary 23, 2023

GitGuardian addresses a critical and widespread problem: developers storing secrets, such as API keys, in repositories where they can be visible to nefarious actors.

Screengrab from podcast about increasing cybersecurity awareness among employees
Cloud

Yes, the Military Really Uses ‘Top Secret’ Folders: Cultivating Cybersecurity Awareness | Anschuetz on Leadership

By Cloud Wars LiveFebruary 22, 2023

Christian Anschuetz and Bob Evans look at the biggest cybersecurity risk for organizations—human error—and discuss how to increase awareness.

CockroachDB Dedicated - Cockroach Labs
Acceleration Economy Minute

How New Cockroach Database Release Simplifies Payment Card Standard Compliance

By Kieron AllenFebruary 22, 2023

Kieron Allen highlights how CockroachDB Dedicated is PCI-DSS certified, making it easier for customers to protect payment card information.

conway's law
Cybersecurity

How ‘Conway’s Law’ Highlights the Impact of Organizational Silos on Cybersecurity

By Robert WoodFebruary 22, 2023

Conway’s Law is a useful lens through which to examine security in large organizations, says analyst Robert Wood, noting that silos introduction friction.

low code multi-cloud strategy
Cybersecurity

How Low-Code Enables Orchestration, Governance in a Multi-Cloud Architecture

By Bill DoerrfeldFebruary 22, 2023

Bill Doerrfeld breaks down the benefits of low-code and multi-cloud and explains how low code can address key multi-cloud challenges.

AI partners
Hyperautomation Minute

How Partners Can Guide Customers to Build AI Apps That Streamline Operations

By Janet SchijnsFebruary 21, 2023

Janet Schijns defines how AI apps, supported by partners, can automate everything from repetitive tasks to supply chains for better operational efficiency.

GitGuardian
Cybersecurity

How GitGuardian Secures Source Code With Its Secret Detection Engine for DevSecOps

By Kieron AllenFebruary 21, 2023

GitGuardian, a Cybersecurity Top 10 Shortlist company, offers a secrets detection platform that ensures source-code security for the DevSecOps era.

sensitive data
Cybersecurity Minute

How Business Units Can Work With CISOs to Protect Sensitive Data

By Frank DomizioFebruary 20, 2023

Frank Domizio explains how partnering with a CISO can provide expertise, tools, and support to ensure that sensitive data remains secure.

SaaS and PaaS
Cybersecurity Minute

Why Uniting Diverse Logs Into a Dashboard Facilitates Cybersecurity Investigations

By Robert WoodFebruary 17, 2023

Robert Wood explains how a linear dashboard view of logs that aligns with SaaS and PaaS providers can lead to more effective cybersecurity investigations.

artificial intelligence security
Cybersecurity

How AI Creates a Cybersecurity Force Multiplier, Identifying and Responding to Threats

By Frank DomizioFebruary 16, 2023

Analyst and CISO Frank Domizio lays out how the accelerating use of artificial intelligence (AI) in cybersecurity can ultimately improve a company’s security posture.

data modernization csuite
Data

CEO, CIO, CISO, and CDO Roundtable on Data Modernization

By John SiefertFebruary 15, 2023

John Siefert, Wayne Sadin, Chris Hughes, and John Muehling discuss why data modernization needs require C-suite execs to collaborate.

Cloud Security Usage
Cybersecurity Minute

How Sysdig Cloud Security Report Calls Out Zero-Trust Disconnect, Misconfiguration Risks

By Chris HughesFebruary 14, 2023

Acceleration Economy analyst Chris Hughes breaks down the latest findings from Sysdig’s 2023 Cloud-Native Security and Usage report.

CTO cloud migration
Data

Why Prioritize Cloud Migration? Try Security, Scalability, and Cutting Technical Debt

By Wayne SadinFebruary 14, 2023

Wayne Sadin delves into the advantages of cloud migration and why CTOs should make it a priority.

Snyk
Acceleration Economy Minute

Why ServiceNow Invested $25 Million in Cybersecurity Provider Snyk

By Kieron AllenFebruary 13, 2023

ServiceNow plans to integrate technology from Snyk, a Cybersecurity Top 10 company, into ServiceNow’s vulnerability response platform.

channel partner cybersecurity
Innovation & Leadership

Not Big Enough to Hire a CISO? Why Cybersecurity Partners Are a Solid Alternative

By Janet SchijnsFebruary 13, 2023

Janet Schijns outlines eights services a cybersecurity channel partner can offer your company, especially if you’re not resourced to hire a CISO.

retail security resilience
Cybersecurity

How the Retail Industry Can Combat Threats and Raise Cybersecurity Resilience

By Frank DomizioFebruary 11, 2023

CISO Frank Domizio looks at common security vulnerabilities in the retail industry and offers practical ways to mitigate them and boost resilience.

AI Cybersecurity
Cybersecurity Minute

How AI Accelerates Threat Detection, Prevents Cybersecurity Breaches

By Frank DomizioFebruary 10, 2023

Frank Domizio explains how AI is becoming increasingly popular within the realm of cybersecurity, noting the applications of this technology.

data compliance
Data

How to Manage Compliance Amid Complex Geo-Specific Data Privacy Standards

By Bill DoerrfeldFebruary 10, 2023

Bill Doerrfeld explains how to effectively manage diverse, geographically specific data governance and compliance standards.

Previous 1 … 19 20 21 22 23 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }