Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
secure defaults
Cybersecurity

How to Handle Security Threats by Default

By Robert WoodOctober 26, 2022

Cybersecurity analyst Robert Wood explains how secure defaults save time and energy for engineers and development teams.

FAIR cyber risk
Cybersecurity

How FAIR Helps the Cybersecurity Industry “Speak the Language of Business” With Risk Quantification

By Chris HughesOctober 25, 2022

Quantifying cyber risk helps board members and other business leaders see the importance of cybersecurity investment. As Chris Hughes explains, the FAIR model offers a framework to do this.

data governance
Data

Why Data Governance Demands CXO Attention

By Pablo MorenoOctober 25, 2022

Any effective data governance should be developed with intention and supported by the organization, which starts at the top, writes Pablo Moreno.

Metaverse police services dubai privacy anonymity
My Metaverse Minute

Why Metaverse Police Services Require Privacy and Anonymity

By Kieron AllenOctober 24, 2022

Dubai’s Ajman police force announced that it will be offering services to Metaverse users, who can report crimes as digital avatars. This raises privacy concerns, says Kieron in episode 186.

security primitives
Cybersecurity

How Businesses Need to Rethink Cybersecurity Posture

By Robert WoodOctober 24, 2022

Doing things the way they’ve always been done is never a good strategy where technology is concerned, and security is no exception, writes Robert Wood.

HYCU Okta
Cloud Wars Horizon

How HYCU, Okta Will Protect Data, Make It Readily Available

By Tom SmithOctober 21, 2022

Investment from Okta gives HYCU entree to a big installed base, and links leading identity management and data protection products.

vulnerability scores
Cybersecurity

Why Effective Cybersecurity Depends on Understanding How Vulnerability Scores Work

By Chris HughesOctober 21, 2022

What’s in a vulnerability score? Chris Hughes explains what these are, where they come from, and how cybersecurity professionals should approach them.

blockchain technology
My Metaverse Minute

Why Blockchain Is About More Than Transparency and Digital Finance

By Kieron AllenOctober 20, 2022

For many, blockchain is inseparable from Bitcoin — but hold onto that viewpoint and you’ll risk falling behind. Blockchain technology goes way beyond cryptocurrency, into areas such as identity security, supply chain, IoT, and governance.

Low-code/no-code risk security
Cybersecurity

How to Balance Risk and Empowerment with Low-Code/No-Code Apps

By Robert WoodOctober 20, 2022

Robert Wood explores several areas of risk that can emerge with the adoption of low-code/no-code applications.

insights into the why and how of SoBM
Cybersecurity

Leveraging SBOMs for Application Dependency & Protection

By Chris HughesOctober 18, 2022

There’s a big push for SBOMs (software bills of material) as it’s becoming clear how crucial they are to cybersecurity. Read our guidebook to learn everything about SBOMs, including what they are and why they’re necessary, and how they work.

CISOs data governance
Cybersecurity

Why CISOs Must Be Part of Data Governance

By Chris HughesOctober 18, 2022

It’s often said that security must be baked in rather than bolted on, and this is especially true when it comes to CISO involvement in an organization’s data governance plans.

nsa supply chain security
Cybersecurity

How the NSA Is Guiding Software Supply Chain Security

By Chris HughesOctober 17, 2022

In episode 31, Chris Hughes explains the NSA’s recent release of software supply chain security guidance for developers.

data loss prevention DLP policies
Cybersecurity

How Poor Data Loss Prevention (DLP) Policies Could Be Putting You at Risk

By Robert WoodOctober 14, 2022

Data loss prevention policies sound good on the surface, but dig deeper and you’ll find that they come with unexpected risks. Analyst Robert Wood explains what these risks are and how to avoid them.

CXO Minute

Why the C-Suite Needs to Take a Nuanced Approach to Cybersecurity

By Wayne SadinOctober 13, 2022

In Episode 51, Wayne uses a bet he once made with a CISO as a jumping-off point to discuss how the C-suite should approach cybersecurity.

simplify IAM sprawl security
Cybersecurity

How to Simplify Identity and Access Management (IAM) to Maximize Security

By Chris HughesOctober 12, 2022

Driving down the IAM environment’s complexity should be a major priority for all organizations, especially given the common problem of attracting and retaining technical talent.

Securing Open Source Software Act Demonstrates critical important of open-source software to national security
Cybersecurity

How a New Senate Bill Enhances Open-Source Software Security

By Chris HughesOctober 11, 2022

In Cybersecurity Minute, Ep. 31, Chris Hughes says it’s clear that the Senate’s Securing Open Source Software Act emphasizes how critical open-source software is to national security and society.

multi-cloud security strategy
Cybersecurity

How to Secure a Multi-Cloud Strategy

By Bill DoerrfeldOctober 9, 2022

Bill Doerrfeld shares tips that help address the unique cybersecurity implications of deploying and managing software across various cloud-based environments.

TensorStore
Data Modernization Minute

How Google TensorStore Handles ‘N-Dimensional Data in the Bigger Space’

By Pablo MorenoOctober 7, 2022

In this Data Revolution Minute, Pablo Moreno explains Google’s release of TensorStore, which is a framework designed to hold and process N-dimensional data. He says this is a perfect solution for training AI.

Cybersecurity User Experience
Cloud

Why Cybersecurity Teams Must Understand the User Experience to Reduce Customer Friction

By Chris HughesOctober 7, 2022

In this Cloud Wars Expo Moment, Chris Hughes explains why the user experience should inform the systems designed by cybersecurity professionals.

autonomous databases security
Cybersecurity

How to Vet Autonomous Database Security

By Robert WoodOctober 6, 2022

“Set it and forget it” assumptions can be dangerous when it comes to security. That’s why it’s important for users to understand everything their cloud tools can and cannot do.

Previous 1 … 27 28 29 30 31 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }