Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Low-code/no-code risk security
Cybersecurity

How to Balance Risk and Empowerment with Low-Code/No-Code Apps

By Robert WoodOctober 20, 2022

Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.

insights into the why and how of SoBM
Cybersecurity

Leveraging SBOMs for Application Dependency & Protection

By Chris HughesOctober 18, 2022

There’s a big push for SBOMs (software bills of material) as it’s becoming clear how crucial they are to cybersecurity. Read our guidebook to learn everything about SBOMs, including what they are and why they’re necessary, and how they work.

CISOs data governance
Cybersecurity

Why CISOs Must Be Part of Data Governance

By Chris HughesOctober 18, 2022

It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.

nsa supply chain security
Cybersecurity

How the NSA Is Guiding Software Supply Chain Security

By Chris HughesOctober 17, 2022

In episode 31, Chris Hughes explains the NSA’s recent release of software supply chain security guidance for developers.

data loss prevention DLP policies
Cybersecurity

How Poor Data Loss Prevention (DLP) Policies Could Be Putting You at Risk

By Robert WoodOctober 14, 2022

Data loss prevention policies sound good on the surface, but dig deeper and you’ll find that they come with unexpected risks. Analyst Robert Wood explains what these risks are and how to avoid them.

CXO Minute

Why the C-Suite Needs to Take a Nuanced Approach to Cybersecurity

By Wayne SadinOctober 13, 2022

In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.

simplify IAM sprawl security
Cybersecurity

How to Simplify Identity and Access Management (IAM) to Maximize Security

By Chris HughesOctober 12, 2022

Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.

Securing Open Source Software Act Demonstrates critical important of open-source software to national security
Cybersecurity

How a New Senate Bill Enhances Open-Source Software Security

By Chris HughesOctober 11, 2022

In Cybersecurity Minute, Ep. 31, Chris Hughes says it’s clear that the Senate’s Securing Open Source Software Act emphasizes how critical open-source software is to national security and society.

multi-cloud security strategy
Cybersecurity

How to Secure a Multi-Cloud Strategy

By Bill DoerrfeldOctober 9, 2022

Bill Doerrfeld shares tips that help address the unique cybersecurity implications of deploying and managing software across various cloud-based environments.

TensorStore
Data Modernization Minute

How Google TensorStore Handles ‘N-Dimensional Data in the Bigger Space’

By Pablo MorenoOctober 7, 2022

In this Data Revolution Minute, Pablo Moreno explains Google’s release of TensorStore, which is a framework designed to hold and process N-dimensional data. He says this is a perfect solution for training AI.

Cybersecurity User Experience
Cloud

Why Cybersecurity Teams Must Understand the User Experience to Reduce Customer Friction

By Chris HughesOctober 7, 2022

In this Cloud Wars Expo Moment, Chris Hughes explains why the user experience should inform the systems designed by cybersecurity professionals.

autonomous databases security
Cybersecurity

How to Vet Autonomous Database Security

By Robert WoodOctober 6, 2022

“Set it and forget it” assumptions can be dangerous when it comes to security. That’s why it’s important for users to understand everything their cloud tools can and cannot do.

Okera Platform
Cloud Wars Horizon

Why Enterprises With Complex Data Access Needs Should Know Okera

By Tom SmithOctober 5, 2022

With the ability to enforce data access policies on a platform agnostic basis, Okera simplifies data analytics access management.

Okera
Cloud Wars Horizon

How Startup Okera Secures Data Analytics Access — at Massive Scale

By Tom SmithOctober 5, 2022

Startup Okera takes a centralized approach to managing access to analytics data. Customers validate the software provides massive scalability.

software vulnerabilities rising, and how to prevent them
Cybersecurity

How to Protect Your Business Against Today’s Security Vulnerabilities

By Bill DoerrfeldOctober 5, 2022

Bill Doerrfeld revisits the past decade of rising software vulnerabilities, which reinforces the need to patch compromised servers, use active threat monitoring, and prepare for quick responses to future zero-day exploits.

software supply chain attacks
Cybersecurity

How Software Supply Chain Attacks Highlight Open Source Security Issues

By Chris HughesOctober 4, 2022

As Chris Hughes explains, the recent U.S. government response to increased software supply chain attacks will force the cybersecurity industry to innovate.

modernize data strategy
Innovation & Leadership

How Data Modernization Unites Security, Access, and BI

By Wayne SadinOctober 3, 2022

Analyst Wayne Sadin offers ways for legacy organizations to update their data strategy so that they can keep up with cloud native organizations.

Twilio Phishing Attacks SaaS Governance
Cybersecurity Minute

Why the Twilio and Cloudflare Phishing Attacks Demonstrate the Need for SaaS Governance

By Chris HughesSeptember 30, 2022

In Ep. 30, Chris Hughes reviews the recent phishing campaign that affected more than 130 companies and explains how hardware-based tokens and other modern SaaS security solutions can help.

low-code/no-code
Low Code / No Code

How Low-Code/No-Code Supports Public Sector Digital Transformation

By Bill DoerrfeldSeptember 29, 2022

Government is yet another area in need of more accessible software development to upkeep the well-being of communities. Bill Doerrfeld explains how low-code/no-code could be the answer.

Acceleration Economy Cloud Wars Horizon Demo Day - Watch Now
Cloud Wars Horizon

Cloud Wars Horizon Demo Day

By Tom SmithSeptember 28, 2022

This digital event delivers a view into the future of AI, Automation, and Cybersecurity companies and solutions that are next in line to make Bob Evans’ Cloud Wars Top 10 list.

Previous 1 … 27 28 29 30 31 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }