Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Is Your Cloud Secure Enough to Store Data?
Data Modernization Minute

Is Your Cloud Secure Enough to Store Data?

Data Revolution Ep 8
Pablo MorenoBy Pablo MorenoApril 28, 2022Updated:June 8, 20221 Min Read
Facebook Twitter LinkedIn Email
To adjust the volume hover the cursor over the volume bar
Share
Facebook Twitter LinkedIn Email

This episode is brought to you by the Cloud Wars Expo. This in-person event will be held June 28th to 30th at the Moscone Center in San Francisco, California.

Highlights

00:25 — Is data that’s stored in the cloud really secure? Simply put— yes, it is secure.

00:45 — Data in the cloud is more secure than local systems or on-premise, as most of the cyber-attacks performed by hackers are based on social engineering.

01:18 — The weakest point of entry to data is still humans—not a machine.

01:23 — Successful attacks on the cloud, creating leakage, are very small compared to those perpetrated on systems administered by humans, such as hard drives.

01:51 — Any cloud has more layers of security than any local system.


Cloud cloud security data Data Revolution featured
Share. Facebook Twitter LinkedIn Email
Pablo Moreno
  • Website
  • LinkedIn

Business Data Scientist and Project Manager (Waterfall & Agile) with experience in Business Intelligence, Robotics Process Automation, Artificial Intelligence, Advanced Analytics and Machine Learning in multiple business fields, gained within global business environment over the last 20 years. University Professor of ML and AI, International speaker and Author. Active supporter of Open-Source software development. Looking to grow with the next challenge.

Related Posts

How ServiceNow and EY Use AI to Merge Brand and Demand in B2B Marketing

June 17, 2025

$1 Trillion RPO!

June 17, 2025

Transforming Compliance: EY and ServiceNow Simplify Complex Regulations

June 16, 2025

Larry Ellison and Safra Catz Humiliate Oracle Skeptics with Stunning Guidance

June 16, 2025
Add A Comment

Comments are closed.

Recent Posts
  • How ServiceNow and EY Use AI to Merge Brand and Demand in B2B Marketing
  • $1 Trillion RPO!
  • Transforming Compliance: EY and ServiceNow Simplify Complex Regulations
  • Larry Ellison and Safra Catz Humiliate Oracle Skeptics with Stunning Guidance
  • Oracle Q4 Blowout: Huge Win for Ellison, Catz; Total Repudiation for Skeptics

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.