Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Interpreting Earnings Results
Innovation & Leadership

How to Interpret Earnings Results in the Acceleration Economy

By John SiefertDecember 7, 2022

John Siefert, Bob Evans, Tony Uphoff, and Scott Vaughan discuss the latest Q3 Cloud Wars Top 10 earnings results, which are nuanced once looked at through the lens of technology and digital transformation.

adversary data breach
Cybersecurity

Why You Must Think Like Your Adversary After a Data Breach

By Robert WoodDecember 7, 2022

Analyst Robert Wood explains a strategy for resolving data breaches that entails getting inside your adversary’s head.

primary secondary impacts incident response
Cybersecurity

How to Mitigate Primary and Secondary Impacts in Incident Response

By Chris HughesDecember 6, 2022

While the realization of a cybersecurity incident of course brings primary impacts, it doesn’t stop there. In this analysis, Chris explains how and why preparation helps.

Cybersecurity Education
Acceleration Economy Minute

Why Cybersecurity Education Is Critical in the Acceleration Economy

By Kieron AllenDecember 5, 2022

In ep. 10, Kieron explains why cybersecurity professionals must prioritize training on cybersecurity issues and prevention.

stop data loss
Cybersecurity

How to Stop Data Loss After a Security Breach

By Frank DomizioDecember 5, 2022

After a breach, you’ll want to stop data loss as soon as possible, but it comes with risks and other drawbacks. Frank shares tips to arm you with the knowledge, options, and flexibility to advise your business on the right approach.

reduce workplace burnout
Cybersecurity

How Tech Leaders Can Reduce Workplace Burnout

By Bill DoerrfeldDecember 4, 2022

Burned out security and software teams are hard to retain and increase the odds of a breach. Bill speaks with Object First’s David Bennett, about how he tackles the issue as an object storage solution startup CEO.

communication breach investigation
Cybersecurity

Why Communication Is Key in a Security Breach Investigation

By Frank DomizioDecember 2, 2022

Frank shares a few essential ways to get the right people, set the ground rules, and stay informed so you can successfully navigate your breach response.

industry cloud startup cropin
Cloud Wars Horizon

How Industry Cloud Startup Cropin Shines in AWS’ Partners Ecosystem

By Tom SmithNovember 30, 2022

Cropin, Couchbase, HYCU, and other Cloud Wars Horizon companies gain new visibility at the AWS re:Invent conference.

security incident response team
Cybersecurity

How to Prioritize Cybersecurity Incident Response Teams When Breached

By Frank DomizioNovember 28, 2022

After a breach, you’ll need help from an incident response team, either in-house or third party. Frank explains how and what to look for.

legal representation
Acceleration Economy Minute

Why Technology Is Forcing Companies to Re-Evaluate Their Legal Representation Needs

By Kieron AllenNovember 24, 2022

In Ep. 6 of the Acceleration Economy Minute, Kieron Allen explains why legal representation is needed for those who wish to succeed in the acceleration economy.

post-breach analysis
Cybersecurity

The 5 Whys of Immediate Response to a Cybersecurity Breach

By Robert WoodNovember 23, 2022

CISO Robert Wood details three techniques to analyze security breaches so that organizations can prevent them in the future.

CISA vulnerability management Chris Hughes
Cybersecurity Minute

How New CISA Guidance Helps Advance Vulnerability Management Across the IT Ecosystem

By Chris HughesNovember 22, 2022

In episode 32, Chris looks at a new Cybersecurity Infrastructure Security Agency post that focuses on three critical steps for advancing vulnerability management across the ecosystem in IT.

edge AI capabilities
AI and Copilots

How Edge AI Drives Smarter Data Systems for IoT Devices, XR Headsets, and Robotics

By Toni WittNovember 22, 2022

By distributing AI computation to local sensors and devices where the data is actually generated, Edge AI powers real-time capabilities for everything from medical devices to self-driving cars to energy grid monitoring, as Toni explains.

regression testing deception technology
Cybersecurity

How Regression Testing and Deception Technology Prevent Future Security Incidents

By Chris HughesNovember 21, 2022

Security and data breaches aren’t all bad news; they’re also opportunities to build on lessons learned and correct deficiencies, as Chris explains.

software supply chain threat
Cybersecurity

Why and How the Software Supply Chain Is Increasingly Under Threat

By Bill DoerrfeldNovember 20, 2022

Bill Doerrfeld summarizes the key points from Sonatype’s “The State of the Software Supply Chain” report to help IT technology divisions better understand how to address open-source security today.

hycu protege platform
Cloud Wars Horizon

How HYCU Addresses Government, Hybrid Cloud, and Security Use Cases

By Tom SmithNovember 17, 2022

Latest updates to HYCU’s Protege platform add support for Azure Gov Cloud, disaster recovery to AWS, cross-cloud recovery.

contracting economy management
Innovation & Leadership

Why and How Ideas to Manage the Contracting Economy

By John SiefertNovember 16, 2022

In Ep. 26 of the Growth Swarm podcast, John, Bob, Scott, and Tony discuss reasons behind today’s economic uncertainty, and why the cloud offers extraordinary alternatives for businesses to create their own futures.

devsecops strategy
Cybersecurity

How to Effectively Communicate the Value of a DevSecOps Strategy Shift

By Robert WoodNovember 16, 2022

Robert explains why communication is key to getting security, legal, sales, and engineering teams on board with a DevSecOps strategy shift.

Defense Approach
Acceleration Economy Minute

Why Organizations Must Expand Their Security Defense Approach

By Kieron AllenNovember 15, 2022

In Ep. 3 of the Acceleration Economy Minute, Kieron references the work of fellow AE cybersecurity analysts who discuss how and why organizations must expand on their approach to defense.

threat hunting incident response
Cybersecurity

Why Attack-Specific Threat Hunting Is Critical for Incident Response

By Chris HughesNovember 15, 2022

Threat hunting is often thought of as something one does to uncover as yet undetected threats in an organization. But there’s also attack-specific threat hunting, which, analyst Chris Hughes explains, is essential when responding to security breaches.

Previous 1 … 25 26 27 28 29 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }