Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
security breach lawyer
Cybersecurity

Why You Need to Consult a Lawyer After a Security Breach

By Frank DomizioNovember 14, 2022

From victim and media notification to legal liabilities and government considerations, the many issues that arise after a security breach are more easily addressed with the help of a lawyer. Frank explains why.

low code no code limits
Business Apps

Why Stack Overflow CEO Says Low-Code/No-Code Should Not Be Taken Seriously

By Bill DoerrfeldNovember 12, 2022

Analyst Bill Doerrfeld discusses the benefits and drawbacks of low-code/no-code with CEO Prashanth Chandrasekar, giving examples of how the approach both widens businesses’ horizons and limits them.

RACI incident response
Cybersecurity

How to Use a RACI Framework in Security Incident Response

By Robert WoodNovember 9, 2022

The first article in a series on the top 10 things to do if you’ve been breached discusses RACI (responsible, accountable, consulted, informed), a framework for defining roles and responsibilities in projects or processes.

cybersecurity data
Data

Why Cybersecurity Matters in Data Modernization

By Chris HughesNovember 9, 2022

In this Data Modernization Battleground moment, Chris says that cybersecurity professionals must understand data inventory, how businesses are using data, and who has access to data.

security vulnerabilities exploitable
Cybersecurity

How to Identify Exploitable Security Vulnerabilities That Pose the Most Risk

By Chris HughesNovember 8, 2022

Analyst Chrus Hughes takes a look at EPSS, a new approach to evaluating vulnerability that takes into account not only criticality and scores, but also exploitability.

teradata okera
Data

How Teradata and Okera Data Tools Shined at the Data Modernization Battleground

By Wayne SadinNovember 7, 2022

Wayne recaps Data Modernization Battleground sessions with Teradata and Okera, which discussed their data analytics for multi-cloud and data security solutions.

security teams developers
Cybersecurity

How Security Teams Can Better Engage Developers in the AppSec Process

By Robert WoodNovember 7, 2022

From hackathons and gamification to champion programs and callouts, there are many ways for security teams to build essential relationships with development teams.

partner ecosystem strategy risk
Innovation & Leadership

How to Evaluate Risk in Partners Ecosystem Strategy

By Janet SchijnsNovember 6, 2022

Janet looks at this year’s Verizon Data Breach Investigations Report (DBIR) and singles out a few facts that can help organizations evaluate risk in partnership strategy.

log4j
Cybersecurity

How the CSRB Suggests We Move Forward From Log4j Vulnerabilities

By Chris HughesNovember 4, 2022

Chris provides takeaways from the Cyber Safety Review Board’s recent Log4j incident report.

Insights into the Why & How of Cybersecurity as a Business Enabler Featured Image
Cybersecurity

Cybersecurity as a Business Enabler

By Chris HughesNovember 3, 2022

Cybersecurity has evolved beyond the “office of ‘no'” to a true business enabler that requires an on-going vigilant effort to keep a resilient security posture

open source security
Cybersecurity

Why Core Open-Source Security Projects Need More Resources

By Bill DoerrfeldNovember 3, 2022

Bill Doerrfeld speaks with oak9 Co-founder Aakash Shah about ways to reduce known and unknown vulnerabilities brought on by open-source software.

Oracle Security Approach Public Sector
Cloud

Why Oracle Uses a Defense in Depth (DiD) Approach to Security in the Public Sector

By Aaron BackNovember 3, 2022

Since the public sector is known to be risk adverse, In the Cloud Wars Expo Moment, Nicholas Smith discusses the public sector’s tendency to be risk-averse, which is why Oracle bakes security into all of its cloud stacks.

financial services CI/CD pipeline
Cybersecurity

How Financial Services Can Better Secure Their CI/CD Pipelines

By Bill DoerrfeldNovember 1, 2022

As Bill explains, continuous delivery/deployment scenarios require special and specific security — especially in industries that handle sensitive personal and financial data.

privacy security hospitality
Cloud

Why Workday Hospitality Emphasizes Privacy and Security

By Aaron BackNovember 1, 2022

In this Cloud Wars Expo Moment, Joe Wilson, CTO for Americas, Workday, explains the never-ending need for privacy and security in the hospitality industry, and why the company offers five core principles in its technologies.

Privacy at the Edge - the Cutting Edge podcast
Edge Computing

Why Privacy at the Edge Is a Growing Concern for Customers

By Leonard LeeOctober 31, 2022

In Ep. 9 of the Cutting Edge podcast, Leonard Lee explains why customers have a growing concern about privacy at the edge, and offers some intriguing solutions to the issue that edge computing can provide.

penetration testing
Cybersecurity

Why Penetration Testing for DevSecOps Drives ROI

By Robert WoodOctober 31, 2022

Penetration testing is an inherently manual process and runs in contrast to the DevSecOps movement, so where does it fit in? Robert Wood delves into it.

Insights into the Why and How of Data and Business Modernization featured image
Data

Successful Data and Business Modernization

By Tony UphoffOctober 30, 2022

Data is the lifeblood of every business today but requires strategy, security, and governance to drive insights and accelerate transformation.

cybersecurity projects c-suite fear
Cybersecurity

How to Translate Cybersecurity Terms for the CEO

By Chris HughesOctober 28, 2022

It’s common for the C-suite to look at cybersecurity efforts with fear, uncertainty, and doubt (FUD). Here’s why that needs to stop, and how to do it.

AI bias
AI and Copilots

How the New NIST AI Playbook Helps Organizations Effectively Manage Bias

By Robert WoodOctober 27, 2022

Managing AI bias empowers organizations to unlock AI’s tremendous opportunity to drive positive outcomes, writes Robert Wood in this look at the new NIST AI playbook’s main takeaways on the topic.

multi-cloud adoption
AI and Copilots

Oracle SVP Explains Why Multi-Cloud Adoption Relies on Cybersecurity

By Aaron BackOctober 26, 2022

In this CloudWorld News Desk interview, Oracle Senior VP of Cloud Infrastructure Mahesh Thiagarajan explains why some users are still reluctant to engage with multi-cloud platforms.

Previous 1 … 26 27 28 29 30 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }