Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Industries

How Microsoft Secures Manufacturers From Factory to the Edge

By Bob EvansSeptember 12, 2022

In this Cloud Wars Expo Moment, Guy Bursell explains Microsoft’s approach to ensuring cloud and data security in the manufacturing industry.

Industry Cloud SVP On How SAP Co-Creating Sustainable Customer Outcomes
Cloud

Industry Cloud SVP on How SAP Co-Creates Sustainable Customer Outcomes

By Aaron BackSeptember 9, 2022

In this Cloud Wars Expo News Desk interview, SAP’s Kai Finck discusses the company’s approach to supply chains, sustainability, data privacy, the partner ecosystem, and co-innovation.

How CISOs & CIOs Can Create An Inclusive Cybersecurity Business Culture
Cybersecurity

How CISOs and CIOs Can Create an Inclusive Cybersecurity Business Culture

By Robert WoodSeptember 9, 2022

Robert Wood offers three ways that a positive culture can be created to attract and keep the right cybersecurity talent for your organization

HYCU and Wasabi Partnership to Fight Ransomware for Customers
Cloud Wars Horizon

How HYCU and Wasabi’s Partnership Will Fight Ransomware

By Tom SmithSeptember 9, 2022

Cloud data protection provider HYCU teams up with cloud storage provider Wasabi to deter ransomware attacks for customers at an affordable price point.

IT Expertise
CXO Minute

Why Boards Need IT Expertise to Manage Risk and Opportunity

By Wayne SadinSeptember 8, 2022

In Episode 44 of the CXO2 Minute, Wayne continues his examination of a CISO’s place within an organization and explains why boards are responsible for understanding all sides of technology.

Chris Huges on Cybersecurity as a guardrail rather than a gate
Cloud

How Cybersecurity Acts As an Enabler for Development Teams

By Chris HughesSeptember 8, 2022

In this Cloud Wars Expo Moment, Chris Hughes explains why bringing cybersecurity into the development workflow is key to empowering engineering teams with guardrails rather than gates.

Data

Breaking Down Data Management Trends in Latin America

By Pablo MorenoSeptember 8, 2022

In this Let’s Talk Data podcast, Quest Software’s Richard Rule explains why and how the LATAM region is “behind the curve” in data management.

Growth Swarm Public Sector
Innovation & Leadership

Why and How the Cloud Is Digitally Transforming the Public Sector

By John SiefertSeptember 7, 2022

In Episode 16 of Acceleration Economy’s Growth Swarm podcast, the panel addresses innovation, partnerships, and sustainability in the public sector.

Security Observability
Cybersecurity

How Observability Practices Improve Traditional Security Efforts

By Bill DoerrfeldSeptember 7, 2022

With complex and distributed software ecosystems, organizations need to reach beyond traditional security measures through observability tools and practices.

CXO Minute

Why Don’t CISOs Sit on the Board of Directors?

By Wayne SadinSeptember 6, 2022

In Episode 44 of the CXO2 Minute, Wayne discusses why CISOs don’t sit on the Board of Directors despite the growing importance of cybersecurity measures.

SBOM Market
Cybersecurity

Understanding the SBOM Market Collision

By Robert WoodSeptember 2, 2022

As the open source ecosystem has evolved, the Software Bill of Materials (SBOM) has caused a shift in the security market.

Cybersecurity Minute

Twilio, CloudFlare Attacks Represent Downstream Vulnerabilities

By Chris HughesSeptember 1, 2022

In Cybersecurity Minute Episode 28, Chris Hughes discusses how malicious actors compromised more than 130 business organizations through poor two-factor authentication practices.

SBOMs What Are They and Why Do They Matter
Cybersecurity

What Are SBOMs, and Are They Really All That?

By Bill DoerrfeldAugust 31, 2022

The Software Bill of Materials (SBOM) increases transparency and is expected to become an integral part of the software industry. Bill Doerrfeld explains why, and what organizations must do about it.

security protocols in "Removing Security Friction" education session by Chris Hughes (pictured)at Cloud Wars Expo
Cloud

How Digital Platforms Are Empowering the Modern Economy

By Chris HughesAugust 31, 2022

In this Cloud Wars Expo Moment, excerpted from the “Removing Security Friction” education session, Chris Hughes explains how businesses must balance strict security protocols with making user data easily accessible to the proper parties.

Cybersecurity

Recent Twitter Security Allegations Suggest Significant Vulnerabilities

By Chris HughesAugust 30, 2022

In Cybersecurity Minute Episode 27, Chris Hughes reacts to major allegations against Twitter’s security policies, including potential interference from foreign agencies.

Top Cloud Compliance Convergence Areas
Cybersecurity

3 Areas Where Cloud Native and Compliance Intersect

By Robert WoodAugust 29, 2022

CISO and Acceleration Economy Analyst Rob Wood explores the cloud compliance approaches about which he is most excited.

GitHub Cyber Attack
Cybersecurity Minute

GitHub Identifies Cyber Attack on Cloned Repositories

By Chris HughesAugust 26, 2022

In Cybersecurity Minute, Episode 26, Chris Hughes reacts to the recently discovered attack on cloned version of GitHub repositories carrying malicious code.

work from anywhere desirability post-pandemic
Cloud

Why Work From Anywhere Programs Aren’t Going Anywhere

By Kenny MullicanAugust 26, 2022

In this Cloud Wars Expo Moment, Mazars Director of Technology Enablement Paul Nauroth corrects the notion that the pandemic was the sole cause for WFA program development. The pandemic merely catalyzed a growing desire for work flexibility.

AppSec Automation: The Speed Imperative
Cybersecurity

AppSec Automation: The Imperative for Speed

By Chris HughesAugust 25, 2022

Automation is not always simple to implement in application security (AppSec), but it’s critical, as Chris Hughes explains.

Secure Data
Data

Securing the 3 States of Data: At Rest, In Motion, In Use

By Pablo MorenoAugust 24, 2022

Pablo Moreno explains the different states of data, and the best strategies for securing each one.

Previous 1 … 28 29 30 31 32 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }