Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Centralized Services and Security
Financial Tech

Centralized Services and Security with Manny Korakis

By John SiefertNovember 16, 2021

In the final episode of this interview series, Manny Korakis offers CFO insights on the process of centralized services and security.

Prevent Cyber Threats by Understanding Hacker Mentality
Cybersecurity

Understand the Hacker Mentality to Combat Cyber Threats

By Kenny MullicanNovember 12, 2021

Focusing on which cybersecurity technologies are best, it’s also important to understand the hacker mentality to fully prevent cyber threats.

SBOM
Cybersecurity

SolarWinds Breach & Cybersecurity Executive Order Propel SBOM

By Chris HughesNovember 10, 2021

There’s much to learn about SBOM, as it provides valuable insights that might otherwise take significant effort to discover.

Cybersecurity
Cybersecurity

Prove It: Cybersecurity Hinges on Organizational Culture

By Aaron BackNovember 9, 2021

Aaron Back hosts analysts Dave Harris, Matt Hudson, and Chris Hughes for a roundtable discussion on Cybersecurity.

Bob Evans on Regulated Industries & Building Compliance into Vertical Clouds
Cloud

Bob Evans on Regulated Industries & Building Compliance into Vertical Clouds

By Bob EvansNovember 8, 2021

Bob Evans, Co-Founder of Acceleration Economy, points out how companies are building in compliance & governance at the infrastructure level

Cybersecurity Plan
Cybersecurity

Cybersecurity for SMBs: A 3-Step Process to Defend Against Growing Risks

By Kenny MullicanNovember 5, 2021

When it comes to SMBs, it’s critical that you have a cybersecurity plan. Use this 3-step process to ensure defense against growing risks.

Data Security for Trailer Company
Cybersecurity

Wilson Trailer Ensures Data Security for Its Cloud Migration

By Cloud WarsNovember 5, 2021

Learn how a global trailer manufacturing company was able to improve its data security by implementing a software solution by Fastpath.

Endpoint Security
Cybersecurity

Endpoint Security – Your First Line of Defense in a Distributed Workforce

By Chris HughesNovember 1, 2021

Although working remote has its benefits, there are still some risks with a distributed workforce. It’s critical to ensure endpoint security.

red flags during software implementation
Cybersecurity

7 Signs Your Enterprise Software Implementation Will Fail

By Bonnie TinderOctober 29, 2021

Bonnie Tinder shares an analysis of the 7 signs that your digital transformation and software implementation projects will be a challenge.

Managed Security Services
Cybersecurity

The Managed Security Services Imperative

By Chris HughesOctober 22, 2021

With enterprises undergoing digital transformations to stay competitive, organizations are also competing for managed security services.

Cybersecurity

The Power of Resilience: Incident Response and Business Continuity

By Chris HughesOctober 15, 2021

Confidentiality, Integrity, and Availability — these are the three primary components of Cybersecurity. Today’s article focuses on the Availability pillar.…

Prove It
Cybersecurity

Prove It: Who Should the CISO Report To?

By Chris HughesOctober 15, 2021

John Siefert hosts analysts Bob Evans, Chris Hughes, and Wayne Sadin for a round table discussion on the role of the CISO.

Even the best passwords can't stop a passwordless future
Cybersecurity

How Passwordless Authentication Can OutMatch Your Best Password

By Bill DoerrfeldOctober 14, 2021

Things will be brighter for users and cybersecurity once all passwords are removed altogether. The future is passwordless, and it’s coming soon.

Preventing ransomware as a service (RaaS) from infecting a computer that is locked down
Cybersecurity

The CFO’s Guide to Ransomware Risk Mitigation

By Frank OhlhorstOctober 13, 2021

Understanding the history, growth and current playing field of ransomware and how to prevent your business against it.

Cloud

Industry Cloud Battleground Week – A Digital Event

By Danielle DunlapOctober 8, 2021

A five-day digital event that delivers the insights to inspire, educate and engage business and technology leaders who are actively defining their industry-specific cloud strategy.

Leonard Lee chats with Aaron Back on the hype and realities of edge computing
Edge Computing

Navigating the Hype and Realities of Edge Computing

By Aaron BackOctober 7, 2021

What’s hype versus reality when it comes to edge computing? Leonard Lee joins me in this “Back @ IT” episode to break it down and where it’s headed, the impact of IoT and security, and much more.

ERP Solution for a Cybersecurity Company
Digital Business

Cysiv Used A Cloud ERP to Meet Client Needs

By Cloud WarsOctober 6, 2021

Learn how a cybersecurity company was able to better meet customer needs by implementing a modern ERP System with the help of ArcherPoint.

Protecting Apps Against Ransomware Attacks
Business Apps

Protecting Your Apps from a Ransomware Attack

By Kieron AllenOctober 4, 2021

Ransomware is on the rise and your apps are vulnerable. Find out how to secure them effectively.

Multi-Factor Authentication
Cybersecurity

Multi Factor Authentication – The Low Hanging Fruit

By Chris HughesOctober 1, 2021

With an increase in remote work, multi-factor authentication is essential to protecting sensitive information from being breached.

AI and Copilots

AI and Security in Your Dataverse Environment with Kylie Kiser

By Jim DonahueSeptember 28, 2021

Kylie Kiser discusses her upcoming sessions, sharing about how attendees can infuse AI as well as security in their Dataverse environment.

Previous 1 … 38 39 40 41 42 … 46 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }