Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register

Cybersecurity

Chris Hughes-Circle

Chris Hughes

Welcome to the Cloud Wars Cybersecurity Channel

Join us as we explore the rapidly expanding and diverse threat landscape through the lens of business growth and resiliency. We also deliver context on the cybersecurity strategies of the top Cloud and AI tech providers, as well as how technology can help customers stay ahead of the most pressing security threats.
Cybersecurity

Analyzing NSA’s Software Supply Chain Security Recommendations, AI Implications

By Chris HughesFebruary 1, 2024

An exploration of the NSA’s software supply chain security guidance and how it can help organizations fortify overall cybersecurity.

CIOs
Innovation & Leadership

Top 5 CIO Challenges for 2024 Include AI, Cloud Migration, and Cybersecurity

By Kenny MullicanJanuary 31, 2024

In 2024, the challenges of AI adoption, cloud migration, and cultural shifts take center stage for CIOs striving to align IT with business.

Cybersecurity

Wiz Report Highlights Surging AI Adoption in Cloud Environments

By Chris HughesJanuary 26, 2024

A look at the dynamic state of AI adoption in the cloud through a Wiz report revealing trends, adoption rates, and the rise of power users in both managed and self-hosted AI services.

Cybersecurity

Lacework Taps AI to Transform Incident Response and Vulnerability Management

By Chris HughesJanuary 25, 2024

Lacework’s latest innovation, AI Assist, transforms cloud-native security by offering personalized recommendations, natural language interactions, and expedited remediation.

Cybersecurity

Report: 5 Cybersecurity Products to Watch in 2024

By Chris HughesJanuary 17, 2024

In this report, Chris Hughes identifies five products — from CloudStrike, NetRise, Palo Alto Networks, Wiz, and Zscaler — that equip CISOs to combat the latest threats.

Cybersecurity

Cisco Acquisitions of Splunk, Isovalent Underscore Focus on Cybersecurity and AI

By Chris HughesJanuary 16, 2024

Cisco is positioning itself for the future of cloud-native cybersecurity and AI through acquisitions of Splunk and Isovalent.

Cybersecurity

Snyk’s AI Code Security Report Reveals Software Developers’ False Sense of Security

By Chris HughesJanuary 12, 2024

Snyk’s report on AI-generated code security shows how developers, lured by accelerated production, are unwittingly overlooking risks.

AI and Copilots

Acceleration Economy Modernizes Business Technology Analyst Landscape with AnalystGPT 

By John SiefertJanuary 9, 2024

AnalystGPT taps into over 10,000 reports, articles, and videos by Acceleration Economy practitioner analysts to answer questions about AI, cloud, cybersecurity, and data.

Cybersecurity

5 Cybersecurity Products to Watch in 2024

By Chris HughesJanuary 8, 2024

The top 5 cybersecurity products to watch in 2024 feature a healthy dose of generative AI and turnkey platforms, as well as supply chain and cloud protections.

Cybersecurity Minute

Snyk Report on AI Code Generation Exposes Risks, Developers’ False Sense of Security

By Chris HughesJanuary 3, 2024

Discover the hidden risks embedded in AI code, including false security assumptions and a pattern of bypassing policies.

Cybersecurity

4 Strategic Threat Intelligence Questions to Elevate a Cybersecurity Program

By Robert WoodJanuary 2, 2024

There is significant strategic value in looking at how cybersecurity threats are evolving and how that relates to strategic business plans.

AI cybersecurity
Cybersecurity

Decoding the EU AI Act: A Look at the Global Implications for AI Security and Compliance

By Chris HughesDecember 22, 2023

For CISOs and security leaders, grappling with the global ramifications of the EU AI Act becomes paramount, necessitating a proactive stance.

Cybersecurity

5 Steps to Align Cloud Security With Business Goals

By Frank DomizioDecember 21, 2023

Frank Domizio explores how IT leaders can ensure their organizations are protected from security threats in a way that also enables business growth.

Cybersecurity Minute

Beyond Bolting On: Embracing Secure AI Across the Development Lifecycle

By Chris HughesDecember 19, 2023

A look at new guidelines for secure AI system development released by the Cybersecurity Infrastructure and Security Agency and the National Cybersecurity Center in the UK, emphasizing a holistic approach throughout the software development lifecycle.

Cybersecurity

5 Ways CISOs Can Collaborate With C-Suite Peers to Drive Threat Intelligence Results

By Chris HughesDecember 14, 2023

Chris Hughes explains why sharing insights from threat intelligence with other senior execs can be a force multiplier in reducing organizational risk.

Cybersecurity

Wiz Extends Security Posture Management to Safeguard AI Technology, Configurations

By Chris HughesDecember 13, 2023

Wiz’s AI Security Posture Management (AI-SPM) addresses security and privacy concerns wrought by AI with comprehensive oversight, inventory management, and misconfiguration checks.

Cybersecurity

Endpoint & Mobile Data Protection

By Chris HughesDecember 11, 2023

In this guidebook, practitioner analysts and CISOs define how to craft a secure foundation for businesses to thrive in today’s ever-changing digital economy.

AI and Copilots

6 Ways to Maintain Cybersecurity as ChatGPT and Generative AI Proliferate

By Bill DoerrfeldDecember 4, 2023

Organizations must consider the security and privacy implications around using generative AI apps and large language models.

Chris Hughes
Cybersecurity

NetRise Introduces AI-Powered Trace Capability for Enhanced Supply Chain Security

By Chris HughesNovember 30, 2023

NetRise introduces Trace, an AI-powered feature revolutionizing software supply chain security, employing natural language processing to proactively identify and validate compromised assets and map relationships across the software supply chain.

Cybersecurity

From Malware Detection to Predictive Analytics, 5 Ways AI Enhances Cybersecurity

By Kenny MullicanNovember 29, 2023

Is AI genuinely a crucial component of a cybersecurity offering? CIO Kenny Mullican explores what existing practices look like with and without the technology.

Previous 1 … 4 5 6 7 8 … 45 Next

Featured Story

Why Cybersecurity Is a Critical Component of ESG Frameworks

2 years ago
Environmental, social, and governance frameworks are on the rise, and they must be crafted with enough security considerations to ward off increased cyber threats.
Read More »

Make better decisions to compete in the acceleration economy in just 5 minutes

Subscribe to our Headlines newsletter.
This field is for validation purposes and should be left unchanged.
Cloud Wars Subscriber Content

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Endpoint & Mobile Data Protection

December 11, 2023

The Role of CASB with DLP | Unlocking Hybrid Work’s Potential Safely

November 16, 2023

The Business Impact and Opportunity of Generative AI

September 29, 2023

Why & How to Create a Zero-Trust Framework

June 12, 2023
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.