Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Protecting Metaversial Experiences
My Metaverse Minute

4 Ways to Secure Your Metaversial Experiences

By Bill DoerrfeldJune 22, 2022

As the Metaverse becomes more ingrained into the worldwide economy, its data will become a valuable attack target. Here’s how to protect it.

Skills for Security Teams
Cybersecurity

3 Necessary Skills for Security Teams to Tackle Today’s Threats

By Robert WoodJune 21, 2022

Technology continues to change, but so have the skill sets needed to thrive in this industry, explains Robert Wood.

Atlassian Issues Security Patch
Cybersecurity Minute

Atlassian Issues a Security Patch Amid Critical Security Flaws

By Chris HughesJune 17, 2022

As Chris Hughes explains in Ep. 18 of Cybersecurity Minute, Atlassian’s notification to the public of these vulnerabilities allowed companies to put mitigating controls in place until the patch was released.

GDPR and Data Privacy
Cybersecurity

4 Years Later, How Has GDPR Changed the CxO Conversation?

By Chris HughesJune 15, 2022

Though it’s primarily for the EU, the sweeping privacy regulation will have a lasting impact outside of Europe in regulating data privacy.

Cybersecurity Strategies
Cybersecurity

5 Valuable Areas of Cybersecurity That Are Often Overlooked

By Robert WoodJune 14, 2022

If neglected, these areas can be a drain on all the other amazing things security teams may be working on, writes Robert Wood.

Verizon Data Breach Investigation Report
Cybersecurity Minute

3 Top Trends From Verizon’s Data Breach Investigation Report

By Chris HughesJune 13, 2022

In Cybersecurity Minute, Ep. 17, Chris recaps the highlights from the annual report including rises in ransomware and supply chain security attacks.

Cybersecurity Minute

$63 Million OPM Data Breach Settlement Still Might Not Be Enough

By Chris HughesJune 10, 2022

In Cybersecurity Minute, Ep 16, Chris provides an update on the 2015 Office of Personnel and Management data breach and subsequent settlement for 22 million users.

Red Door Digital Data Revolution
Data

Talking About Web3 Gaming Development With Red Door Digital

By Pablo MorenoJune 9, 2022

In the Data Revolution podcast premiere episode, Pablo hosts CEO Joseph Derflinger and CTO See Wan Toong to discuss their studio’s new game ‘Reign of Terror.’

Why It's So Hard to Find Public Sector Cybersecurity Talent and General Cyber Talent
Cybersecurity

Why It’s So Hard to Find Cyber Talent for the Public Sector

By Chris HughesJune 9, 2022

Finding cyber talent is challenging enough, but the public sector’s national security and social services concerns make the hunt even harder.

Costa Rica State of Emergency
Cybersecurity Minute

State of Emergency Declared as Costa Rica Faces Rampant Cyber Attacks

By Chris HughesJune 7, 2022

In this Cybersecurity Minute, Chris analyzes how the digital infrastructure of Costa Rica is falling prey to cyber crime.

Private Sector Security Lessons Learned From the Public Sector
Cybersecurity

Securing the Private Sector: 3 Lessons Learned From the Public Sector

By Robert WoodJune 7, 2022

Although there are differences between the private and public sectors, there is also more overlap than we hear from social media conjecture.

Cybersecurity in 2030
Cybersecurity

What Will Cybersecurity Be Like in 2030?

By Chris HughesJune 6, 2022

From supply chain software to workforce changes, future cybersecurity trends require closer looks by companies looking to make their systems more resilient.

CSM APTs minute from Chris Hughes
Cybersecurity Minute

APTs Prefer to Advantage of Vulnerabilities

By Chris HughesJune 3, 2022

While zero-day vulnerability attacks still occur, new research emphasizes the need for basic security hygiene to protect against most advanced persistent threats.

Cybersecurity with Kubernetes
Cybersecurity Minute

Kubernetes API Servers and Potential Data Vulnerability

By Chris HughesJune 1, 2022

Chris addresses reports that more than 80% of Kubernetes API servers are exposed to the public internet.

Remote Work Security
Cybersecurity

Protecting the New Normal: How InfoSec Has Responded to Remote Work

By Bill DoerrfeldJune 1, 2022

As more companies embrace a decentralized workforce, they must increase cybersecurity efforts for remote work environments.

Cloud Database Security
Cybersecurity

4 Cloud Database Security Concerns for SMBs

By Kenny MullicanMay 31, 2022

Cloud-based systems all have their own risks, which makes security particularly critical for SMBs in order to keep their data safe.

Kubernetes as a multi-cloud solution
Cybersecurity

How Kubernetes Can Be a Multi-Cloud Solution

By Robert WoodMay 30, 2022

Kubernetes opens up an attractive opportunity to do multi-cloud deployments in a way that doesn’t conjure up nightmares. Here are a few things to consider.

Managed Service Providers
Cybersecurity Minute

Managed Service Providers Are Under Attack

By Chris HughesMay 27, 2022

Chris addresses FBI, CISA, and NSA warnings that managed service providers that are also SMBs are increasingly popular targets for supply chain attacks.

Vulnerability Management
Cybersecurity

Vulnerability Management: 3 Key Elements of Protection and Detection

By Chris HughesMay 27, 2022

As technological systems become more complex through Cloud, microservices, IoT, and more, the need for sound vulnerability management is even more paramount.

OWASP Broken Access Control
Cybersecurity

Why Is Broken Access Control OWASP’s #1 Threat?

By Bill DoerrfeldMay 25, 2022

We explore the reasons for its infamous rise. Regardless, organizations need to increase efforts to secure app access.

Previous 1 … 32 33 34 35 36 … 47 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }