Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Lookout
Cybersecurity

How Lookout’s Platform Secures the Enterprise, From Mobile Devices to Cloud Apps

By Kieron AllenFebruary 7, 2023

Kieron Allen profiles Top 10 Cybersecurity company Lookout, whose platform provides endpoint security for everything from mobile devices to data stored in the cloud.

citizen developers support
Cybersecurity Minute

How Citizen Developers Add Value With Proper Support, Security Training

By Frank DomizioFebruary 6, 2023

Frank Domizio explains how citizen developers add value to an organization but suggests that they need access to the right support in order to succeed.

data governance sucks
Data

How Cloud and Cybersecurity Innovations Enable Modern Data Governance

By Wayne SadinFebruary 6, 2023

Wayne Sadin explains how data governance came to be so messy, and how strategic use of cloud and cybersecurity can impose order.

Lookout Security
Acceleration Economy Minute

How Lookout Upgrade Unifies Cybersecurity Management From Endpoint to Cloud

By Kieron AllenFebruary 6, 2023

Kieron Allen explains how Lookout, a Top 10 Cybersecurity as a Business Enabler company, adapts to customer needs with a unified cybersecurity framework.

cybersecurity sustainability
Cybersecurity

How Critical Infrastructure Highlights the Link Between Sustainability and Cybersecurity 

By Chris HughesFebruary 4, 2023

The shift to renewable energy leaves oil, gas, and electrical infrastructure vulnerable to threats such as ransomware, DDoS, and more, CISO Chris Hughes explains.

Insights into the Why & How of AI & Hyperautomation's Impact_featured
AI and Copilots

AI and Hyperautomation Impact

By Aaron BackFebruary 3, 2023

Is your business prepared to hyperautomate and use AI to get ahead? Our guidebook provides first-person actionable insights from practitioners.

appsec vulnerability management
Cybersecurity

How Contextual Analysis Zeroes in on the Most Exploitable AppSec Vulnerabilities

By Chris HughesFebruary 3, 2023

Contextual analysis makes Application Security (AppSec) more efficient by identifying the most exploitable vulnerabilities, CISO Chris Hughes says.

Gorilla Glue
Innovation & Leadership

Why Gorilla Glue’s Cedric Wells Looks Forward to AI Focus at Digital CIO Summit

By Tony UphoffFebruary 3, 2023

In this CIO Summit preview, Tony Uphoff chats with one of the digital event’s featured speakers about his technology background and interest in AI and sustainability.

SaaS security
Data

Why SaaS Security Requires a Foundation Built on Standards and Zero Trust

By Wayne SadinFebruary 2, 2023

SaaS products need secure foundations so that CIOs and CISOs can design successful and productive applications that mitigate risk for the organization.

data governance
Cybersecurity

Why Effective Data Governance Relies on CDO-CISO Collaboration

By Chris HughesFebruary 2, 2023

CISO Chris Hughes explains why Chief Data Officers (CDOs) and Chief Information Security Officers (CISOs) need to work together to drive data governance.

Top 10 lists
Innovation & Leadership

How Practitioners Built Top 10 Shortlists for AI/ Hyperautomation, Cybersecurity, and Data

By Kieron AllenFebruary 2, 2023

Kieron Allen and Aaron Back discuss how the companies on Acceleration Economy’s new Top 10 shortlists were chosen — and who chose them.

HYCU
Cybersecurity

How HYCU Aims to Reinvent SaaS Data Protection With New Dev Platform

By Tom SmithFebruary 1, 2023

Cloud data backup leader HYCU is taking a development-centric approach to scaling backup services for the thousands of SaaS apps in use.

HYCU
Cybersecurity Minute

How HYCU Helps CIOs Take On ‘Fundamentally Impossible’ Scale of SaaS Backup

By Tom SmithFebruary 1, 2023

HYCU CEO Simon Taylor discusses the companys R-Cloud development platform designed to unlock SaaS data backup services at scale.

API security
Cybersecurity

How a SaaS Control Plane Centralizes API Security and Compliance

By Robert WoodJanuary 31, 2023

In an age of proliferating APIs and SaaS apps, a control plane helps cybersecurity pros centrally manage security policies, access, and visibility, CISO Robert Wood says.

codebases
Cybersecurity Minute

Why Your Codebase Needs Proper Security Stages To Prevent Leaks

By Robert WoodJanuary 30, 2023

In this Cybersecurity Minute, Robert Wood explains why codebases need proper security stages that address potential leaks.

Cybersecurity

How Government Agencies Use Governance Frameworks to Secure Sensitive Data

By Robert WoodJanuary 30, 2023

CISO Robert Wood explains why government agencies use data governance frameworks and how they protect national security, citizen privacy, and more.

Cyberstorm
Acceleration Economy Minute

Why World Economic Forum Urges a Unified Response to Cybersecurity ‘Storm’

By Kieron AllenJanuary 26, 2023

The World Economic Forum (WEF) is anticipating a cyberstorm, which calls for a global, unified response across geopolitical borders.

site reliability engineers
Innovation & Leadership

How to Engineer Site Reliability for Great Digital Customer Experience

By Bill DoerrfeldJanuary 26, 2023

High user expectations for positive end-to-end digital experiences drive the need for site reliability engineering, analyst Bill Doerrfeld says.

Backups
Cybersecurity Minute

How Multi-Cloud Strategy Strengthens Data Backup, Adds Resilience

By Robert WoodJanuary 26, 2023

Multi-cloud deployment is a focused way to solve the problem of backup failures while adding resilience to services, says CISO Robert Wood.

Backup and Security Software
Cybersecurity Minute

Why Data Backup and Recovery Is a Top Cybersecurity Priority

By Frank DomizioJanuary 25, 2023

Frank Domizio covers four features of data backup and recovery software, and why they’re essential to protect against disasters, ransomware, and other incidents.

Previous 1 … 20 21 22 23 24 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }