Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Cybersecurity Frameworks
Cybersecurity

Understanding the 5 Most Important Cybersecurity Frameworks

By Bill DoerrfeldFebruary 17, 2022

Review the top cybersecurity frameworks from NIST, CIS, CSA, ISO, and AWS. By following these benchmarks, you can improve your organization’s security.

Follow these benchmarks to improve your cybersecurity.

Cybersecurity

Infographic: Top 5 Cybersecurity Mitigations for CFOs

By Chris HughesFebruary 17, 2022

Acceleration Economy Analyst Chris Hughes shares 5 preventative measures to increase your cybersecurity footing.

My Metaverse Minute

From Gamers to Grandmas: The Future of the Metaverse

By Aaron BackFebruary 16, 2022

The future and foundation of the Metaverse is dependent on giving the next generation new opportunities and breaking traditional barriers.

DoD Selects Google Cloud for its Zero Trust Initiatives2
Cybersecurity

Google Cloud Secures Public Cloud for DoD to Bolster Cybersecurity Paradigm

By Aaron BackFebruary 15, 2022

Lightning struck with Google Cloud’s recent deal with the Defense Innovation Unit to expand cybersecurity initiatives for the public sector.

Cybersecurity in the Metaverse
My Metaverse Minute

How You Can Protect Your Identity in the Metaverse

By Robert WoodFebruary 14, 2022

Cybersecurity and the metaverse are both changing quickly. Explore the possibilities of cybersecurity within the context of the metaverse.

Creating Business Value with Cybersecurity
Cybersecurity

Creating Business Value Through Cybersecurity

By Chris HughesFebruary 9, 2022

As the world is powered by technology and a digital economy, cybersecurity is vital to protecting and creating business value.

Open-Source Software
Cybersecurity

Shifting Left With Open-Source Software

By Robert WoodFebruary 8, 2022

Software built nowadays leverages open-source software, which alleviates the need to rebuild something that already exists.

Cybersecurity

Infographic: 5 Steps to Protect Your Organization From Ransomware

By Robert WoodFebruary 8, 2022

CISO & Acceleration Economy Analyst Robert Wood defines the 5 steps to protecting today’s digitally driven business from ransomware threats

Metaverse Gold Rush
My Metaverse Minute

What are the Consequences of the Metaverse Gold Rush?

By Aaron BackFebruary 4, 2022

What are the consequences, good or bad, of this mad dash into the metaverse? Like the gold rush of yesteryear, we are just at the beginning of new frontiers. In this Back @ IT episode, Kieron Allen joins to explore the untapped potential in the metaverse.

Analyst Predictions - Will A Cybersecurity Culture Help Mitigate Future Risk
Cybersecurity

Analyst Predictions: Will a Cybersecurity Culture Help Mitigate Future Risk?

By Aaron BackFebruary 4, 2022

In this Analyst Predictions episode, the Analyst Network talks through the future of cybersecurity culture and risk mitigation.

Program for Vulnerabilities
Cybersecurity

Four Key Metrics to Consider for a Vulnerability Management Program

By Robert WoodFebruary 1, 2022

Metrics are essential to running any security program — especially when developing a vulnerability management program.

Work From Anywhere Security
Cybersecurity

Cybersecurity Implications of the Work From Anywhere Paradigm

By Chris HughesJanuary 31, 2022

With further adoption of Work From Anywhere, it’s critical that businesses understand the cybersecurity implications that come with it.

Cybersecurity

Cybersecurity Battleground — Top CISO Questions Answered

By Tom SmithJanuary 28, 2022

Cybersecurity Battleground brings together the top minds from the vendor and analyst communities to debate the opportunities and challenges of managing cybesecurity as a business…

Cybersecurity

Infographic: 7 Cyber Security Startups to Watch in 2022

By Chris HughesJanuary 28, 2022

7 Cyber Security Startups to Watch in 2022

Vulnerability Management
Cybersecurity

Seeking a Simpler User Journey for Vulnerability Management

By Robert WoodJanuary 28, 2022

With an abundance of cybersecurity tools, vulnerability management can benefit from simplifying the user experience.

Mental Health Apps
Business Apps

The Ethical Dilemma of Mental Health Apps

By Kieron AllenJanuary 26, 2022

Mental health apps are an important tool for many users, but how close are many developers from overstepping the mark with data privacy?

Codification & Security
Cybersecurity

Shifting Security Left via Codification

By Chris HughesJanuary 26, 2022

Cloud computing has led to a paradigm shift involving the increased use of Infrastructure-as-a-Code (IaC) through codification.

Cybersecurity Tool Sprawl
Cybersecurity

Cybersecurity Tool Sprawl Can Lead to Team Overload and Lower Impact

By Chris HughesJanuary 24, 2022

With the development of new technologies, the cybersecurity landscape requires a new tool to address potential vulnerabilities.

Tools & Risk Prioritization
Cybersecurity

Cybersecurity Tools: Non-Standard Risk Ratings Make Prioritization a Challenge

By Robert WoodJanuary 19, 2022

With a lack of standards for risk assessment, cybersecurity tools may be leading to more confusion when determining risk prioritization.

Enterprise Patch Management
Cybersecurity

Next Steps in Enterprise Patch Management from NIST

By Chris HughesJanuary 17, 2022

Enterprise Patch Management best practices include mitigating disruptions, inventorying software assets, and defining risk response scenarios.

Previous 1 … 36 37 38 39 40 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }