Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
SEC and Cybersecurity Expertise
Cybersecurity Minute

SEC Advocates for Cybersecurity Expertise at the Board Level

By Chris HughesApril 22, 2022

In this Cybersecurity Minute, Chris discusses action being taken by the SEC to ensure cybersecurity expertise at the board level.

API Attacks
Cybersecurity

Cloudflare Application Security Report Reveals API Attacks Increasing Significantly

By Bill DoerrfeldApril 22, 2022

Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.

Nation-State Hackers
Cybersecurity Minute

Federal Agencies Warn of Nation-State Hackers

By Chris HughesApril 20, 2022

In this Cybersecurity Minute, Chris reports an advisory from federal agencies warning about nation-state hackers.

Security Monitoring
Cybersecurity

Choosing a Security Monitoring Solution for Your Cybersecurity Portfolio

By Robert WoodApril 20, 2022

Security monitoring is one part of an overall effective security strategy. What tools will compliment your organizations strategy?

Least Privilege
Cybersecurity

Understanding and Deploying Least Privilege Security Models

By Bill DoerrfeldApril 19, 2022

As a fundamental cybersecurity principle, the concept of least privilege is one that companies should revisit as risks rise.

FBI Malware
Cybersecurity Minute

FBI Protects by Intruding to Remove Malware

By Chris HughesApril 15, 2022

In this Cybersecurity Minute, Chris debates the FBI taking action against malware and hackers for the second time this year.

Digital Identity Security
Cybersecurity

The New Security Perimeter: Digital Identities

By Chris HughesApril 14, 2022

Identity has become the new perimeter in modern Zero Trust aligned environments. So, what are the fundamentals of digital identity security?

Autopatch by Microsoft
Cybersecurity Minute

Microsoft Embraces Automatic Patching to Quell Malicious Actors

By Chris HughesApril 13, 2022

In this Cybersecurity Minute, Chris talks about an autopatch solution by Microsoft and the benefits that it has for organizations.

Data Privacy & Trust
Cybersecurity

Are Your Customers & Partners First Class Data Privacy Citizens?

By Robert WoodApril 13, 2022

Organizations that invest in data privacy encounter a major opportunity to build trust with their customer bases and partners.

cybersecurity market
Cybersecurity

Four Cybersecurity Companies Redefining The Market

By Chris HughesApril 12, 2022

When looking at the Cybersecurity market, these top players stand out amongst competitors. What makes them unique in this industry?

Centralized Patient Care
Healthcare

How Decentralized Technology Can Manage and Secure Centralized Healthcare

By Paul SwiderApril 11, 2022

Decentralized technologies are offering new paths forward to centralize patient care by leveraging a new healthcare paradigm.

Microsoft Partner Program Overhauled to Emphasize Cloud Strategy
Cloud

Microsoft Partner Program Overhauled to Emphasize Cloud Strategy

By Aaron BackApril 8, 2022

The evolution of the Microsoft partner program brings the cloud and customers front and center, and unlocks new potential for CXOs

Risk & Governance
Digital Business

Four Steps for Managing Governance, Risk, and Compliance

By Tony UphoffApril 8, 2022

This four-step framework can help guide your company through the process in actively implementing risk management.

CISO CFO Collaboration
Cybersecurity

How Collaboration Between CISOs and CFOs Creates Opportunities

By Robert WoodApril 7, 2022

There’s a tremendous opportunity for the CISO to collaborate with the CFO, as finance and security play a significant role for organizations.

Channel Partners
Digital Business

Channel Partners Help Businesses Deal with Security Risks and Cyber Attacks

By Janet SchijnsApril 7, 2022

CXOs should consider channel partners, as they can provide solutions to recover from and prevent cyber attacks.

Multi-Factor Authentication & CXOs
CXO Minute

Why CXOs Should Care About Multi-Factor Authentication

By Wayne SadinApril 6, 2022

In this Future CXO Minute, Wayne explains how multi-factor authentication is a key security component and why CXOs should prioritize it.

CISO
Cybersecurity

Should the CISO Report to the C-Suite or to IT leadership?

By Chris HughesApril 6, 2022

What role should the CISO be reporting to? What key activities will they have oversight and provide expertise on?

Smart Contracts
Digital Business

How Smart Contracts Can Securely Revolutionize the Enterprise Edge

By Leonard LeeApril 4, 2022

How can secure and stored smart contracts that are based on permissioned blockchains work for the enterprise edge?

Microsoft Security Metaverse
My Metaverse Minute

My Metaverse Minute Ep 43: Microsoft Metaverse Security Callout

By Kieron AllenApril 4, 2022

In this My Metaverse Minute, Kieron talks about the callout from the Microsoft Security Chief about how security must be integral to every Metaverse platform design.

IDS and IPS - Intrusion Detection and Prevention
Cybersecurity

How Intrusion Detection and Prevention Tools Fight Ransomware

By Robert WoodApril 1, 2022

IDS and IPS technologies are essential components of a layered defense strategy in preventing ransomware attacks.

Previous 1 … 33 34 35 36 37 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }