Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Interview with Aviatrix CEO Steve Mullaney at Cloud Wars Expo
Cloud

Aviatrix CEO Steve Mullaney on Building Better Cloud Security

By Aaron BackAugust 5, 2022

In this Cloud Wars Expo News Desk interview, Aviatrix CEO Steve Mullaney addresses the challenges of securing cloud environments.

Application Security (AppSec) Best Practices
Cybersecurity

The Top 5 Best Practices for Application Security

By Chris HughesAugust 4, 2022

Application Security (AppSec) is a robust domain with myriad specialties, tools, and best practices. Here’s what to focus on first.

Howard Boville interview News Desk
Cloud

IBM’s Howard Boville on Co-Innovation, Cyber Threats, and Hybrid Cloud Adoption

By Aaron BackAugust 2, 2022

In this News Desk interview conducted on-site at Cloud Wars Expo, Aaron Back chats with IBM’s Head of Cloud.

Hybrid Multi-Cloud
Cybersecurity

Hybrid Multi-Cloud Is the New Normal

By Bill DoerrfeldAugust 1, 2022

As organizations are increasingly adopting multiple clouds, they need to be prepared to onboard hybrid multi-cloud technologies securely.

Cloud

See How Our Analysts Covered the Acceleration Economy at Cloud Wars Expo

By Logan JonesJuly 29, 2022

Snapshots of our Acceleration Economy Network analysts Wayne Sadin, Kenny Mullican, Tony Uphoff, Aaron Back, Scott Vaughan, Toni Witt, Kieron Allen, Ronak Mathur, Paul Swider, and Chris Hughes leading Cloud Wars Expo live sessions, interviews, and panels

CIS security benchmark
Cybersecurity Minute

CIS Releases the Software Supply Chain Security Benchmark

By Chris HughesJuly 27, 2022

In this Cybersecurity Minute, Ep. 23, Chris Hughes details the CIS software supply chain security benchmark, which was developed alongside Aqua Security.

Metaverse workplace surveillance
My Metaverse Minute

Remote Employees Concerned About Metaverse Workplace Surveillance

By Kieron AllenJuly 27, 2022

In My Metaverse Minute, Ep. 23, Kieron examines a new survey of workers who stated concerns around privacy in virtual office environments.

Aaron Back at Cloud Wars Expo
AI and Copilots

Cloud Wars Expo Demonstrated How to Leverage Cloud, Data, and AI

By Aaron BackJuly 27, 2022

Aaron Back reviews his time at Cloud Wars Expo and how it differed from his previous conference experiences — in a good way.

Vulnerability Management Tools: How to find them
Cybersecurity

How to Find the Right Vulnerability Management Tools

By Robert WoodJuly 26, 2022

When managing threats, no organization has the same exact needs. Robert Wood shares four factors to look at to help find solutions that fit, no matter the scenario.

Why You Need Quantum Safe Encryption
CXO Minute

What Is Quantum Safe Encryption (and Why Do You Need It?)

By Wayne SadinJuly 25, 2022

Wayne takes Episode 39 of this CXO Minute to explain why quantum encryption is needed now, even if quantum computing is still years away.

Brute Ratel tool used in APT-like adversary attadk, says Chris Hughes
Cybersecurity Minute

Brute Ratel Tool Used to Conduct Undetectable APT-Like Adversary Attacks

By Chris HughesJuly 21, 2022

In Episode 22 of Cybersecurity Minute, Chris Hughes explains how malicious actors are using the Brute Ratel tool to undetectably breach security.

Chris Hughes talks about cybersecurity at the Cloud Wars Expo
Cybersecurity

5 Key Cybersecurity Takeaways From Cloud Wars Expo

By Chris HughesJuly 15, 2022

Chris Hughes singles out Zero Trust, Multi-Cloud IAM, compliance innovation, and other cybersecurity trends that surfaced at Cloud Wars Expo.

Vertical Clouds and Other Cloud Wars Expo Cybersecurity Takeaways With Chris Hughes
Cybersecurity

Industry Vertical Clouds, Zero Trust, and Other Cybersecurity Trends From Cloud Wars Expo

By Chris HughesJuly 14, 2022

Chris shares his Cloud Wars Expo takeaways, including an emphasis on industry-specific clouds, stronger data security, and supply chains.

ReversingLabs discovers software supply chain attack
Cybersecurity Minute

ReversingLabs Uncovers Malicious Code in Software Supply Chain Attack

By Chris HughesJuly 12, 2022

The discovery includes malicious code with more than 17,000 harmful downloads, says Chris Hughes in Cybersecurity Minute, Episode 21.

cloud-native security risk
Cybersecurity

6 Common Security Risks For Cloud-Native Approaches

By Bill DoerrfeldJuly 8, 2022

The cloud-native approach will modernize enterprise software architecture — but what are the security implications? Bill Doerrfeld explains.

Cybersecurity Bills
Cybersecurity Minute

What to Expect From Two New Federal Cybersecurity Bills

By Chris HughesJuly 7, 2022

In the latest Cybersecurity Minute, Ep. 20, Chris summarizes the White House’s latest move to curb cyberattacks with greater collaboration.

DevSecOps
Cybersecurity

Why DevSecOps Is Crucial to a Successful Cloud Cybersecurity Strategy

By Bill DoerrfeldJuly 6, 2022

As IT moves to the cloud, new threats emerge. DevSecOps is the answer to incorporating security throughout the continuous software lifecycle.

SOC Cybersecurity
Cybersecurity

How the SOC Is Shifting With the Rapidly Evolving Cybersecurity Field

By Robert WoodJuly 1, 2022

The way that data and collaboration tools, cross-team engagement, and SOAR tools are improving is expanding the how and where that the SOC can add value to an organization.

Metaverse Governance
My Metaverse Minute

What Does the Future of Governance in the Metaverse Look Like?

By Kieron AllenJune 29, 2022

Kieron looks at how cybersecurity, user rights, data privacy, and interoperability figure into administration of the decentralized virtual world.

SOC
Cybersecurity

What Will the SOC of the Future Look Like?

By Chris HughesJune 28, 2022

With a rapidly evolving threat landscape and higher customer expectations, Security Operations Center’s next steps must involve a new path with modern technologies.

Previous 1 … 30 31 32 33 34 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }