Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Metaverse Privacy: Fact or Fiction?
My Metaverse Minute

Metaverse Privacy: Fact or Fiction? 

By Kieron AllenAugust 12, 2022

As VR and AR devices open new avenues for data collection, how will data privacy be implemented in the Metaverse?

CHIPS Act explainer by Chris Huges
Cybersecurity Minute

CHIPS Act Aims to Boost Domestic Chip Production

By Chris HughesAugust 11, 2022

In Cybersecurity Minute, Episode 24, Chris unpacks the newly signed bill, which is designed to boost U.S. domestic semiconductor chip production.

Matt Hughes on the Microsoft Power Platform
Cloud

Matt Hughes Talks Metaverse, Security, and Microsoft Power Platform

By Aaron BackAugust 10, 2022

In this News Desk interview, Aaron Back welcomes special guest Matt Hughes to discuss Microsoft’s big Metaverse plans, cybersecurity, and more.

Röhm uses workspot cloud desktop technology
Cloud Wars Horizon

Cloud Desktops Give Manufacturer Röhm Secure, High-Speed Access to 3D Apps

By Tom SmithAugust 9, 2022

The PLEXIGLAS manufacturer selected Workspot’s cloud desktop technology to provide secure, high-speed access to design apps for engineers at partner firms.

Cyber Workforce Development
Cybersecurity

Why Cyber Workforce Development Is Critical for Effective Security

By Chris HughesAugust 9, 2022

Chris Hughes details examples of keeping workforce development front and center in an organization’s attempt to adopt DevSecOps and drive effective security and digital modernization.

Industrial Edge - The Cutting Edge Podcast
Edge Computing

What Is the Industrial Edge?

By Leonard LeeAugust 9, 2022

In The Cutting Edge podcast, Ep. 6, Leonard Lee covers what makes the Industrial Edge different, and why it matters to an organization’s future.

Workspot desktop in the cloud
Cloud Wars Horizon

Workspot’s Cloud Desktops Deliver Secure, High-Speed Access For Hybrid Work

By Tom SmithAugust 8, 2022

By leveraging the cloud, the aptly-named Workspot lets employees access their full desktop — in a variety of forms — from wherever they’re working.

Workspot Cloud Desktops
Cloud Wars Horizon

Cloud-Based Desktops Are a Secure and Efficient Way to Run Apps For Hybrid Work

By Tom SmithAugust 8, 2022

In Cloud Wars Horizon Minute, Ep. 28, Tom Smith introduces Workspot’s technology, which effectively secures desktops that users access in the cloud.

Interview with Aviatrix CEO Steve Mullaney at Cloud Wars Expo
Cloud

Aviatrix CEO Steve Mullaney on Building Better Cloud Security

By Aaron BackAugust 5, 2022

In this Cloud Wars Expo News Desk interview, Aviatrix CEO Steve Mullaney addresses the challenges of securing cloud environments.

Application Security (AppSec) Best Practices
Cybersecurity

The Top 5 Best Practices for Application Security

By Chris HughesAugust 4, 2022

Application Security (AppSec) is a robust domain with myriad specialties, tools, and best practices. Here’s what to focus on first.

Howard Boville interview News Desk
Cloud

IBM’s Howard Boville on Co-Innovation, Cyber Threats, and Hybrid Cloud Adoption

By Aaron BackAugust 2, 2022

In this News Desk interview conducted on-site at Cloud Wars Expo, Aaron Back chats with IBM’s Head of Cloud.

Hybrid Multi-Cloud
Cybersecurity

Hybrid Multi-Cloud Is the New Normal

By Bill DoerrfeldAugust 1, 2022

As organizations are increasingly adopting multiple clouds, they need to be prepared to onboard hybrid multi-cloud technologies securely.

Cloud

See How Our Analysts Covered the Acceleration Economy at Cloud Wars Expo

By Logan JonesJuly 29, 2022

Snapshots of our Acceleration Economy Network analysts Wayne Sadin, Kenny Mullican, Tony Uphoff, Aaron Back, Scott Vaughan, Toni Witt, Kieron Allen, Ronak Mathur, Paul Swider, and Chris Hughes leading Cloud Wars Expo live sessions, interviews, and panels

CIS security benchmark
Cybersecurity Minute

CIS Releases the Software Supply Chain Security Benchmark

By Chris HughesJuly 27, 2022

In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.

Metaverse workplace surveillance
My Metaverse Minute

Remote Employees Concerned About Metaverse Workplace Surveillance

By Kieron AllenJuly 27, 2022

In My Metaverse Minute, Ep. 23, Kieron examines a new survey of workers who stated concerns around privacy in virtual office environments.

Aaron Back at Cloud Wars Expo
AI and Copilots

Cloud Wars Expo Demonstrated How to Leverage Cloud, Data, and AI

By Aaron BackJuly 27, 2022

Aaron Back reviews his time at Cloud Wars Expo and how it differed from his previous conference experiences — in a good way.

Vulnerability Management Tools: How to find them
Cybersecurity

How to Find the Right Vulnerability Management Tools

By Robert WoodJuly 26, 2022

When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.

Why You Need Quantum Safe Encryption
CXO Minute

What Is Quantum Safe Encryption (and Why Do You Need It?)

By Wayne SadinJuly 25, 2022

Wayne takes Episode 39 of this CXO Minute to explain why quantum encryption is needed now, even if quantum computing is still years away.

Brute Ratel tool used in APT-like adversary attadk, says Chris Hughes
Cybersecurity Minute

Brute Ratel Tool Used to Conduct Undetectable APT-Like Adversary Attacks

By Chris HughesJuly 21, 2022

In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.

Chris Hughes talks about cybersecurity at the Cloud Wars Expo
Cybersecurity

5 Key Cybersecurity Takeaways From Cloud Wars Expo

By Chris HughesJuly 15, 2022

Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.

Previous 1 … 30 31 32 33 34 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }