Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
cybersecurity becoming compulsory in the United States
Cybersecurity

Will Compulsory Cybersecurity Become a United States Reality?

By Kieron AllenAugust 23, 2021

Recent moves by the White House suggest that compulsory cybersecurity could become a reality in some sectors.

order processing improvements at packaging equipment company
Business Apps

How a Packaging Manufacturer Accelerated Production with Dynamics NAV

By Cloud WarsAugust 20, 2021

Learn how a packaging equipment manufacturer, Triangle Package Machinery Company, improved their order processing with Dynamics NAV.

disruption prevention for su
Business Apps

5 Supply Chain Management Essentials to Avoid Disruption

By Bridget CourneyaAugust 16, 2021

In this piece, learn why investing in cloud data analytics, artificial intelligence, and following a cloud migration strategy can help businesses overcome future problems, whether it’s a pandemic supply chain disruption or a cyber attack.

inventory management system for global electronic manufacturers
Automation

Inventory Management at Bel Power Accelerated with a New PLM System

By Cloud WarsAugust 12, 2021

Business Challenge – Finding a Way to Streamline Multiple ERP Systems Bel Fuse is a global electronics manufacturer with over…

cloud migration security
Cybersecurity

Malware and Ransomware Security Risks with Cloud Migration

By Aaron BackAugust 11, 2021

Many businesses are transitioning to the cloud due to its wide range of benefits. Cloud migration makes it possible for your employees to work outside of the office, which is especially important in today’s work environment.

security vs productivity in remote work
Digital Business

The Enterprise Security Paradox: IT Freedom vs. Security

By Bill DoerrfeldAugust 4, 2021

93% of digital workers routinely circumnavigate corporate IT restrictions The traditional IT permitter is dissolving. For years, Bring Your Own…

cloud computing and security for businesses
Cybersecurity

How Private Cloud Computing Can Reduce Your Security Risks

By Cloud WarsJuly 26, 2021

Today’s modern workplace is heavily data-driven. All of this information is at the core of most business strategies. Data makes…

security solution for cloud technology
Cloud

Top 5 Reasons Google’s New Cloud IDS Security Solution Matters

By Sara CordovaJuly 21, 2021

Technology is ever advancing and so are the cyber threats. Therefore, security is so important to your business and its…

security development plan for renewable energy facilities
Cloud

Pattern Energy Group Improved Security Development With Fastpath

By Cloud WarsJuly 21, 2021

Business Challenge – Security Development As a publicly-traded company, Pattern Energy Group focuses on serving clients, protecting the environment, and…

cybersecurity future threat prevention
Cybersecurity

How to Prevent Against the Next Generation of Cybersecurity Threats

By Kieron AllenJuly 19, 2021

Cybersecurity has advanced in unison with the development and mass adoption of IT technologies. Ever since organizations began working with…

robot prevention technology
Cybersecurity

Are You a Robot: Yubikey May Be the New CAPTCHA Tests

By Cloud WarsJuly 15, 2021

First appearing in 1997, the CAPTCHA test has been around since the early days of the internet. Passing the “Are…

ERP and PLM as innovative solutions
Business Apps

ERP and PLM: Trainvac’s 6-Weeks to Integrate Bluestar

By Cloud WarsJuly 15, 2021

Business Need – ERP and PLM Systems for Business Processes In 2019, Trainvac was founded in Wedel, Germany. Team members…

Back @ IT: Understanding Biometric Security and Passwordless Access
Cybersecurity

Podcast: Understanding Biometric Security and Passwordless Access with Justin Macorin

By Aaron BackJuly 2, 2021

Security is a foundation of any application and optimal network environment. What role does biometrics play in a passwordless future?

Back @ IT: Building a Cybersecurity Foundation with Ted Harrington
Cybersecurity

Podcast: Building a Cybersecurity Foundation with Ted Harrington

By Aaron BackJune 23, 2021

Ethical hacker and best-selling author Ted Harrington joins Aaron Back to discuss security as an enabler, its impact on AI and IoT, and the importance of a security foundation

Aaron Back chats with Greg Ness and Shannon Smith
Cybersecurity

The Importance of a Creating A Culture of Security with DigitSec

By Aaron BackJune 8, 2021

Aaron Back chats with Greg Ness, CMO, and Shannon Smith, COO of DigitSec about the importance of security at all levels and roles within a company

Cybersecurity

Essential Chief Information Security Officer (CISO) Roles and Responsibilities

By Bridget CourneyaMay 10, 2021

Understanding the role of a Chief Information Security Office (CISO) is crucial: Key duties include disaster recovery plans and cybersecurity best practices.

Cybersecurity

How to Manage Changing Security Needs With Microsoft D365

By Jarrod KraemerApril 10, 2021

By ensuring the security of sensitive information while staying up-to-date with dynamic security needs, you can protect your cyber environment.

Cybersecurity

Roles of the Data Professional Clearly Explained

By Pablo MorenoApril 9, 2021

Many people try to explain the difference among all roles of the data professional – In this piece, Pablo Moreno adds his own spin on the conversation

Cybersecurity

How to Avoid Data Misuse and Internal Fraud with Microsoft Dynamics 365

By Jarrod KraemerApril 5, 2021

Check out this blog to discuss the key steps to avoiding data misuse and internal fraud with Microsoft D365.

Cybersecurity

How to Navigate Global Data Privacy and Protection Laws

By Aaron BackApril 2, 2021

Data privacy and protection laws are expanding to more areas of the world. This puts added pressure on organizations to be prepared with their processes.

Previous 1 … 39 40 41 42 43 … 45 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.