Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Vulnerability Reports
Cybersecurity

In Cybersecurity, Beware Death by a Thousand Vulnerability Reports

By Robert WoodJanuary 12, 2022

As a mode of communication for security teams, vulnerability reports require effective management but often involve a problematic process.

Vulnerability Chaining
Cybersecurity

How ‘Vulnerability Chaining’ Turns Minor Security Threats Into Big Ones

By Chris HughesJanuary 10, 2022

When faced with vulnerabilities, businesses often have to focus on the most severe cases. But, vulnerability management needs to go beyond these scoring frameworks.

Ransomware 2021
Cybersecurity

5 Steps to Protect Your Organization from Ransomware Attacks

By Robert WoodJanuary 5, 2022

Ransomware has continued to evolve and 2021 saw multiple high-profile attacks that led to significant socio-economic disruptions.

Compliance in the Cloud
Cybersecurity

How the Cloud Modernizes Manual, Inefficient Compliance Practices

By Chris HughesJanuary 4, 2022

The need to maintain a level of compliance is a reality for any security leader – and cloud computing has shifted the starting point for ensuring security.

Cybersecurity Startups
Cybersecurity

7 Cybersecurity Startups to Watch in 2022

By Chris HughesJanuary 3, 2022

As the cybersecurity landscape is rapidly changing, these cybersecurity startups are on the rise with the vast adoption of new technologies.

That's a Wrap on 2021
News

That’s a Wrap on 2021: Key Insights from the Year and A Look Ahead

By Sara CordovaDecember 31, 2021

The Wrap crew reflects on the Acceleration Economy growth from 2021 and looks ahead towards goals, events, and market evolutions happening in 2022

Secure Software Development
Cybersecurity

Three Approaches to More Secure Software Development

By Chris HughesDecember 30, 2021

While there are many aspects of implementing effective application security, a key element is implementing secure software development practices for internal application development activities.

Framework for Industry Cloud Security
Cloud

How to Move Faster with Fewer, Simpler Security Frameworks

By Robert WoodDecember 27, 2021

Frameworks can become complicated — especially within the cyber security industry. So, why are frameworks important and how can they be a useful source for this industry?

cybersecurity priorities
Cybersecurity

Predictions 2022: 5 Cybersecurity Priorities for CISOs and CXOs

By Chris HughesDecember 22, 2021

Security is critical to business success, as an enabler and a competitive differentiator. Here are 5 cybersecurity priorities to address in 2022.

No-Code Apps & Cyber Security
Cybersecurity

The Risky Intersection of Low-Code Development and Cybersecurity

By Robert WoodDecember 20, 2021

Low-code/no-code app development has evolved to empower more users to innovate more freely and lower barriers for automated work.

IT Governance
Low Code / No Code

IT Governance Is Broken. Here’s How We Can Fix It.

By Bill DoerrfeldDecember 17, 2021

IT governance is traditionally clunky and bureaucratic. How can we balance innovation with governance in the age of citizen development?

Security Awareness to Detect Phishing Activity
Cybersecurity

How CIOs Can Fight ‘Free Pizza!’ and Other Phishing Tricks

By Kenny MullicanDecember 15, 2021

It’s critical for employees to be trained to detect phishing activity to protect private business information from landing in the hands of a hacker.

Cyber Security & the CFO
Cybersecurity

Cyber Security and Tomorrow’s CFO

By Bill DoerrfeldDecember 15, 2021

With high-profile breaches occurring on a near-daily basis, CFOs must understand trends in cyber security & finance and mitigation.

Data Privacy & Protection
Cybersecurity

The CFO’s Guide to Data Privacy, Protection, and Response

By Frank OhlhorstDecember 13, 2021

Since data privacy is so complex, CFOs and other business leaders need to understand it and how to respond if data is compromised.

Top 10 Takeaways from the Industry Cloud Battleground
Cloud

Top 10 Takeaways from the Industry Cloud Battleground

By Aaron BackDecember 9, 2021

The Industry Cloud Battleground Week digital event dove deep into healthcare, manufacturing, financial services, & retail industries. But, what were the top takeaways?

ransomware defense tactics
News

As Ransomware Evolves, Defense Tactics Must Get More Creative

By Robert WoodDecember 9, 2021

For organizations coasting by regulatory compliance, it’s time to batten the hatches. Ransomware adversaries are moving at light speed.

Supply Chain Risk Management
Cybersecurity

Weak Links Abound in Cybersecurity Supply Chain Risk Management

By Chris HughesDecember 7, 2021

With nearly every organization relying on digital technologies to deliver value, establishing a C-SCRM program is becoming increasingly critical.

Cloud Security
Cybersecurity

CFOs Must Assess the Costs, Risks, and Benefits of Cloud Security

By Frank OhlhorstDecember 6, 2021

While there are clear benefits of cloud, one of the biggest liabilities of the cloud comes in the form of cybersecurity.

Cybersecurity

Passwordless Authentication Is the Next Line of Defense in Cybersecurity

By Chris HughesDecember 3, 2021

The embrace of passwordless doesn’t guarantee a future free of data breaches and account compromises but it does introduce a more secure method of authentication for users.

cybersecurity
Cybersecurity

Risk Ownership Is Key to Cybersecurity and Organizational Readiness

By Robert WoodNovember 30, 2021

Risk is involved with just about everything that happens inside an organization, but who really holds ownership of the risk?

Previous 1 … 37 38 39 40 41 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

3 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }