Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Ask Copilot
  • Agentic AI Battleground
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Agentic AI Battleground
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
New Oracle Cloud Security Capabilities
Cybersecurity Minute

New Security Capabilities Strengthen Oracle Cloud

By Aaron BackMay 25, 2022

In this Cybersecurity Minute, Aaron looks at Oracle Cloud’s new security features and the use of machine learning in cloud data threat assessment.

Achieving Seamless Data Governance in the Age of Data Privacy
Cybersecurity

Achieving Seamless Data Governance in the Age of Data Privacy

By Aaron BackMay 24, 2022

Okera’s Bobby Napiltonia and Nong Li join Acceleration Economy analysts Wayne Sadin and Aaron Back to discuss data stewardship in a time of expanding regulations and compliance requirements.

Supply Chain Complexity Risk Management Plan
Cybersecurity

3 Steps to Proactively Protect the Supply Chain

By Robert WoodMay 24, 2022

As supply chain complexity has exploded, CISOs need to map out the risk management strategies for their organizations.

Remote Access
Cybersecurity

9 Tips to Improve Security for Remote Access

By Bill DoerrfeldMay 20, 2022

From military submarines to astronomers charting the night sky, remote access is everywhere & poses a serious threat if left without security.

ROAD to Cloud Wars Expo: How Multi-Cloud Security Can Become a Business Enabler
Cloud

ROAD to Cloud Wars Expo: How Multi-Cloud Security Can Become a Business Enabler

By Bob EvansMay 19, 2022

At Cloud Wars Expo, cybersecurity specialist and analyst Chris Hughes will speak on multi-cloud threat management.

Open-Source Software Security
Cybersecurity Minute

Improving the Security of Open-Source Software

By Chris HughesMay 18, 2022

In this Cybersecurity Minute, Chris talks about efforts being made to improve open-source software security by OpenSSF.

Secrets Management Plan
Cybersecurity

What’s Your Secrets Management Plan For When a Leak Occurs?

By Chris HughesMay 17, 2022

While secrets management has been a challenge, it’s critical that organizations have a game plan for when a credential leak occurs.

Spring4Shell Vulnerability
Cybersecurity

Components of Spring4Shell Vulnerability Every Business Leader Should Know

By Bill DoerrfeldMay 16, 2022

Shortly on the heels of the Log4j is a new exploit in the Spring Framework, Spring4Shell. Here we explore what it is and how to mitigate it.

Collaboration of Humans and AI
AI and Copilots

3 Key Benefits of an AI + Human Collaboration

By Kenny MullicanMay 13, 2022

Although some may think that robots are going to replace humans, there are many beneficial aspects of using AI as an assistant.

Risk Management
Innovation & Leadership

Managing Digital Risk and Growth to Future-Proof Your Balancing Act

By Janet SchijnsMay 13, 2022

As the future is certainly digital, organizations need to ensure they are able to manage digital risk and growth.

Supply Chain Risk Management
Cybersecurity Minute

NIST’s Updated C-SCRM Guidance

By Chris HughesMay 13, 2022

In this Cybersecurity Minute, Chris talks about NIST’s updated C-SCRM Guidance based on tasking from the Cyber Executive Order from the President.

Containers
Cybersecurity

What Are Containerized Applications and How Should They Be Secured?

By Chris HughesMay 10, 2022

As containers are changing the tech landscape, business leaders need to understand containerized applications, orchestration, and security.

Cyber Resilience
Cybersecurity

How Ensuring Cyber Resilience is Critical in Today’s Digital Ecosystems

By Chris HughesMay 9, 2022

In today’s digitally-driven world, fostering cyber resilience in global, digital ecosystems is critical to ensure secure innovation.

Rob Wood chats with Aaron Back on How A Cybersecurity Framework Creates New Business Value
Cybersecurity

How A Cybersecurity Framework Creates New Business Value

By Aaron BackMay 5, 2022

In this Back @ IT episode, Aaron hosts a conversation with Robert Wood to discuss how a cybersecurity framework can add value.

Metaverse Safety
Cybersecurity

Cutting Through the Hype to Secure the Metaverse Experience

By Chris HughesMay 2, 2022

As there is much excitement about the emerging virtual world, many still can’t help but question the level of security in the Metaverse.

Data Cloud Secure
Data Modernization Minute

Is Your Cloud Secure Enough to Store Data?

By Pablo MorenoApril 28, 2022

In this Data Revolution Minute, Pablo answers the frequently asked question: Is data stored in the cloud really secure?

Evaluating IAM Tools
Cybersecurity

5 Questions Security Teams Should Ask When Evaluating IAM Tools

By Robert WoodApril 27, 2022

Security teams should consider these key questions when evaluating identity and access management (IAM) tools.

multi-cloud IAM
Cybersecurity

The Impact of Multi-Cloud on Identity & Access Management (IAM)

By Chris HughesApril 26, 2022

Multi-cloud services are often associated with their own identities, permissions, authentication, and authorization activities.

SEC and Cybersecurity Expertise
Cybersecurity Minute

SEC Advocates for Cybersecurity Expertise at the Board Level

By Chris HughesApril 22, 2022

In this Cybersecurity Minute, Chris discusses action being taken by the SEC to ensure cybersecurity expertise at the board level.

API Attacks
Cybersecurity

Cloudflare Application Security Report Reveals API Attacks Increasing Significantly

By Bill DoerrfeldApril 22, 2022

Data from Cloudflare exposes the top threats facing today’s web applications, including HTTP malformed requests, insecure API, & bots.

Previous 1 … 33 34 35 36 37 … 47 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }