• ARTICLES
    • 5G
    • AI
    • Authors
    • Opening Lines
    • Big Data
  • CATEGORIES
    • AI
    • Big Data
    • Blockchain
    • Cloud
    • Comms
    • Devops
    • Fintech
    • GDPR
    • IoT
    • Robotics
    • Security
  • VIDEO
    • #CloudTalks
    • 2017 Videos
    • 2018 Videos
    • Blue Chip
    • CEE GCCM 2018 Berlin
  • NEWS
  • SUBSCRIBE
  • LIVE
Search
  • ABOUT
    • Contact
    • Newsletter
    • Work with us
    • Privacy Policy
    • Terms and Conditions
Cloud Computing, IoT, Big Data, Analytics, Social & Tech articles, key commentators, influence in the sector & global #CloudInfluence rankings.
  • ARTICLES
    • Top 5 trends that will shape data management and protection in 2021

      Top 5 trends that will shape data management and protection in 2021

      Fog Computing And IoT: The Future Of IoT App Development

      Fog Computing And IoT: The Future Of IoT App Development

      The case for a data culture and user adoption

      The case for a data culture and user adoption

      5 Reasons To Adopt Cloud During The Pandemic

      5 Reasons To Adopt Cloud During The Pandemic

      How To Ensure Security With Cloud Hosting?

      How To Ensure Security With Cloud Hosting?

      All5GAIAuthorsOpening LinesBig Data
  • CATEGORIES
    • AI
    • Big Data
    • Blockchain
    • Cloud
    • Comms
    • Devops
    • Fintech
    • GDPR
    • IoT
    • Robotics
    • Security
  • VIDEO
    • Blue Chip | SAP HANA | EP3

      Blue Chip | SAP HANA | EP3

      Blue Chip | SAP HANA | EP2

      Blue Chip | SAP HANA | EP2

      Blue Chip | SAP HANA | EP1

      Blue Chip | SAP HANA | EP1

      James King | Blue Chip | Tailored Solutions For You

      James King | Blue Chip | Tailored Solutions For You

      ps logo

      Pure Storage – Robson Grieve

      All#CloudTalks2017 Videos2018 VideosBlue ChipCEE GCCM 2018 Berlin
  • NEWS
  • SUBSCRIBE
  • LIVE

Cloud Computing, IoT, Big Data, Analytics, Social & Tech articles, key commentators, influence in the sector & global #CloudInfluence rankings. Compare the Cloud

Tweet
Share
Share
5 Reasons To Adopt Cloud During The Pandemic

5 Reasons To Adopt Cloud During The Pandemic

Mohak Arya - 13 Jan, 2021
Today Red Hat announced a definitive agreement to acquire StackRox

Today Red Hat announced a definitive agreement to acquire StackRox

Max Vince - 8 Jan, 2021
Why Is Security a Stepping Stone to Technology-Driven Marketing Personalisation?

Why Is Security a Stepping Stone to Technology-Driven Marketing Personalisation?

Deepak Gupta - 4 Jan, 2021
Testing times. The parallels between the fight for regular testing in a pandemic and the security of the cloud.

Testing times. The parallels between the fight for regular testing in a pandemic...

Adrian Crawley - 30 Dec, 2020
How cloud resilience has been challenged and why security strategy needs a rethink.

How cloud resilience has been challenged and why security strategy needs a rethink.

Mike O'Malley - 17 Dec, 2020
Award-winning broadcaster Disruptive Live launches dedicated cross-platform companion app.

Award-winning broadcaster Disruptive Live launches dedicated cross-platform companion app.

Kate Bennett - 17 Dec, 2020
New-gen Security for Smart devices Becomes a Must

New-gen Security for Smart devices Becomes a Must

Deepa Jatania - 13 Oct, 2020
A Guide to Data Privacy and Translation

A Guide to Data Privacy and Translation

Ofer Tirosh - 28 Sep, 2020
Collaboration without the security chaos

Collaboration without the security chaos

Matt Lock - 11 Sep, 2020
Enabling Intelligence-Driven Security: the rise of CISO as a service

Enabling Intelligence-Driven Security: the rise of CISO as a service

Azeem Aleem - 14 Jul, 2020
Remoting even remoter?

Remoting even remoter?

Galeal Zino - 25 Jun, 2020
7 Reasons for SMBs to Invest in Cyber Security

7 Reasons for SMBs to Invest in Cyber Security

Brent Whitfield - 19 Jun, 2020
The changing role of connectivity in healthcare

The changing role of connectivity in healthcare

David Hassman - 15 Jun, 2020
Maintaining business continuity in the face of change

Maintaining business continuity in the face of change

Ed Whitehead - 11 Jun, 2020
Safeguarding cyber health in uncertain times

Safeguarding cyber health in uncertain times

Mitchell Scherr - 8 Jun, 2020
How to protect your organisation from cyber espionage

How to protect your organisation from cyber espionage

Adam Louca - 29 May, 2020
Mobile Cyber-Espionage: How to Keep Your Executives Safe

Mobile Cyber-Espionage: How to Keep Your Executives Safe

Bharat Mistry - 22 May, 2020
How machine learning can give you the data security you need

How machine learning can give you the data security you need

Peter Bradley - 19 May, 2020
Protect your productivity with DaaS

Protect your productivity with DaaS

David Blesovsky - 8 May, 2020
The past, present and future of the CVSS

The past, present and future of the CVSS

Jonathan Wilkins - 7 May, 2020
All You need to know About Securing your eCommerce Store from Cyber Attacks

All You need to know About Securing your E-Commerce Store

Henrik Adams - 6 May, 2020
8 Cybersecurity Tips For Working Remotely

8 Cybersecurity Tips For Working Remotely

Dan Baker - 1 May, 2020
Managing The Evolving Data and Privacy Law Landscape

Managing The Evolving Data and Privacy Law Landscape

Dale Strickland - 22 Apr, 2020
4 Ways Armoured Vehicles Can Teach Us About Cloud Cybersecurity

4 Ways Armoured Vehicles Can Teach Us About Cloud Cybersecurity

Chris Hudson - 17 Apr, 2020
DDoS Attacks Vary Based on Date and Time

DDoS Attacks Vary Based on Date and Time

Benjamin Campbell - 15 Apr, 2020
Smart home security: Why cloud isn’t always the answer

Smart home security: Why cloud isn’t always the answer

Ruslan Vinahradau - 13 Apr, 2020
Setting up a Public Wi-Fi Network – The Essential Dos and Don'ts

Setting up a Public Wi-Fi Network – The Essential Dos and...

Nathan Hill-Haimes - 10 Apr, 2020
The Growing Need for Security in Health Data

The Growing Need for Security in Health Data

Jori Hamilton - 10 Apr, 2020

Artificial Intelligence and Security

Dainan Gilmore - 9 Apr, 2020
Cyber Security Threats Companies Face in the Digital Age?

Cyber Security Threats Companies Face in the Digital Age?

Ben Fower - 2 Apr, 2020
Why Smart Homes Require Smarter Security

Why Smart Homes Require Smarter Security

Andy Palmer - 1 Apr, 2020
Why cybersecurity is essential for physical security peace of mind

Why cybersecurity is essential for physical security peace of mind

Steven Kenny - 25 Mar, 2020

Hosted physical security delivers benefits for business

Rodrigue Zbinden - 20 Mar, 2020
Ensuring Security In An Era Of AI And Cloud Platforms

Ensuring Security In An Era Of AI And Cloud Platforms

Ralf Llanasas - 11 Mar, 2020
Cloud and Web Application Security: Growing Confidence and Emerging Gaps

Cyber Security: How much could a security breach cost your business?

Steve Thomas - 10 Mar, 2020
Top 5 Cloud Security Solutions for Your Business

Top 5 Cloud Security Solutions for Your Business

Harold Kilpatrick - 10 Mar, 2020
Information Governance

Tips for implementing good information governance

Paul Hampton - 9 Mar, 2020

Ways to Improve the Security of Your Smart Home

Zorica Stojanova - 6 Mar, 2020

How Can We Ease Education with the Internet of Things?

Paul Osborne - 28 Feb, 2020
Email Security Tips for Small Businesses

Email Security Tips for Small Businesses

William Chalk - 27 Feb, 2020
Cyberwarfare: the New AI Frontier

Cyberwarfare: the New AI Frontier

Dave Rogers - 27 Feb, 2020

Solving Surveillance Storage Woes with the Cloud

David Friend - 21 Feb, 2020
CISOs Must Lead From The Front On Security

CISOs Must Lead From The Front On Security

Azeem Aleem - 20 Feb, 2020
Internet of Things: The Ransomware Threat - Preventing The Next Wave of Ransomware Attacks

Internet of Things: Preventing The Next Wave of Ransomware Attacks

Mark Banfield - 12 Feb, 2020
Has your organisation locked the stable door?

Has your organisation locked the stable door?

Adrian Crawley - 11 Feb, 2020

Keeping Safe With Smart Devices & IoT

Dale Strickland - 7 Feb, 2020
The damaging effect of cloud outages, and how to stop them

The damaging effect of cloud outages, and how to stop them

Neil Ferguson - 3 Feb, 2020
Being Successful in Cyber Security

Being Successful in Cyber Security

Tom Kranz - 3 Feb, 2020
Today Red Hat announced a definitive agreement to acquire StackRox

How the Cloud and Automation Impact Database Security

Marie Johnson - 22 Jan, 2020

10 Practical Tips for Keeping Your Business’ Data Secure

Ben Griffin - 22 Jan, 2020
Cloud vs on-premise: striking a balance on security

Cloud vs on-premise: striking a balance on security

Martin Rudd - 18 Dec, 2019
Taking the fog out of cloud security

Taking the fog out of cloud security

Oliver Wessling - 16 Dec, 2019
The importance of data privacy in digital transformation

The importance of data privacy in digital transformation

Sophie Chase-Borthwick - 12 Dec, 2019
Common Informational Security Loopholes In Data Engineering

Common Informational Security Loopholes In Data Engineering

Dancun Kingori - 11 Dec, 2019
Emerging Trends in Cloud Technology

Emerging Trends in Cloud Technology

Jackie Ness - 9 Dec, 2019
IoT devices: The Trojan horses of our time

IoT devices: The Trojan horses of our time

Steven Feurer - 6 Dec, 2019
Overcoming Cloud Complexity

Overcoming Cloud Complexity

Ayman Gabarin - 29 Nov, 2019
Seven effects of DDoS attacks on cloud environments

DDoS attacks – Seven effects it has on cloud environments

Joshua Osborn - 5 Nov, 2019
The eight most common cyber- threats, and how to mitigate them

The eight most common cyber-threats, and how to mitigate them

Marc Wilczek - 23 Oct, 2019
Security_Cloud

7 Common ERP System Security Problems and Safety Steps

Kaloyan Dimitrov - 18 Oct, 2019
Two for one: the top security measures for retailers

Two for one: the top security measures for retailers

Thomas Goodall - 27 Sep, 2019
Don't demonise data: central government, citizens, and digital safety

Don’t demonise data: central government, citizens, and digital safety

Alan Back - 19 Sep, 2019
Top five considerations to consider when migrating security to the cloudTop five considerations to consider when migrating security to the cloud

Top five considerations to assess when migrating security to the cloud

Craig Talbot - 19 Sep, 2019
Big Data - New technologies against fraud

Big Data – New technologies against fraud

Vidita Mehta - 30 Aug, 2019
VPN: Reclaim Your Internet Freedom

VPN: Reclaim Your Internet Freedom

Dainan Gilmore - 22 Aug, 2019
How Data Security and Privacy Can Save Corporations Money

How Data Security and Privacy Can Save Corporations Money

Ben Fower - 15 Aug, 2019
Info On Cyber-Security Training And Careers

Info On Cyber-Security Training And Careers

Aimee Laurence - 13 Aug, 2019
How Can Consumers Stay Safe When Shopping Online?

How Can Consumers Stay Safe When Shopping Online?

Ben Fower - 29 Jul, 2019
The irreplaceable security practice

The irreplaceable security practice

Simon Strutt - 4 Jul, 2019
Can cyber insurance offer comfort anymore?

Can cyber insurance offer comfort anymore?

Mike O’Malley - 3 Jul, 2019
How to Streamline Businesses Through Tech

How to Streamline Businesses Through Tech

Nathan Hill-Haimes - 26 Jun, 2019
9 in 10 SME owners still lacking information on GDPR compliance

9 in 10 SME owners still lacking information on GDPR compliance

Hasna Haidar - 19 Jun, 2019
Spend on Cybersecurity or be prepared to spend much more on ransomware

Spend on Cybersecurity or be prepared to spend much more on...

Rob Sobers - 11 Jun, 2019
Don’t Be A Victim! 10 Ways To Protect You and Your Business From Fraud

Don’t Be A Victim! 10 Ways To Protect You and Your...

Sophie Davidson - 4 Jun, 2019
The Importance of UI and UX in Driving Better Collaboration

The Importance of UI and UX in Driving Better Collaboration

Lyndsay Cook - 3 Jun, 2019
Turn physical security into business insight

Turn physical security into business insight

Rodrigue Zbinden - 31 May, 2019
Up in the clouds with cyber security

Up in the clouds with cyber security

Joseph Carson - 20 May, 2019
Cloud strategy: Don’t leave security on the sidelines

Cloud strategy: Don’t leave security on the sidelines

Nathan Britton - 14 May, 2019
More than half of British businesses witnessed cyber-attacks in 2019

More than half of British businesses witnessed cyber-attacks in 2019

Marc Wilczek - 8 May, 2019
How to protect yourself from invoice fraud

How to protect yourself from invoice fraud

Neil Robertson - 7 May, 2019
Broadband for business resilience and recovery

Broadband for business resilience and recovery

Jamie Kavanagh - 2 May, 2019
Measures to Ensure a Safe Digital Experience

Measures to Ensure a Safe Digital Experience

Dainan Gilmore - 26 Apr, 2019
Big Data: Even Bigger Questions

Big Data: Even Bigger Questions

Darren Hockley - 25 Apr, 2019
AI, 5G, trust and much more work to do - five key take outs from this year’s RSA conference

AI, 5G, trust and much more work to do – five...

Ian Woolley - 1 Apr, 2019
The problem with print servers: using the cloud to improve security and compliance

The problem with print servers: using the cloud to improve security...

Tony Lomax - 27 Mar, 2019
How to make AI work for your business, today

How to make AI work for your business, today

Craig Lodzinski - 26 Mar, 2019
Why “NoSQL” doesn’t equal “insecure”

Why “NoSQL” doesn’t equal “insecure”

Perry Krug - 5 Mar, 2019
What To Do If You’ve Been Hacked

What To Do If You’ve Been Hacked

Terry Hearn - 22 Feb, 2019
Blockchain: Adopting legal frameworks to gain competitive advantage

Blockchain: Adopting legal frameworks to gain competitive advantage

Rob Eakins - 21 Feb, 2019
Medical IT Must Boost Its Immune System

Medical IT Must Boost Its Immune System

Kevin Deierling - 19 Feb, 2019
Securing Privacy While Using Devices at School

Securing Privacy While Using Devices at School

Howard Dawson - 24 Jan, 2019
Why is Everyone Talking About VPNs?

Why is Everyone Talking About VPNs?

James Murray - 10 Jan, 2019
The Cloud’s Fight Against The Dirty Dozen

The Cloud’s Fight Against The Dirty Dozen

Mike O'Malley - 19 Dec, 2018
Unplanned Effects of Modern Payment Methods

Unplanned Effects of Modern Payment Methods

Adrian Cannon - 18 Dec, 2018
Incident Enrichment | IBM Resilient

Incident Enrichment | IBM Resilient

IBM Resilient - 16 Dec, 2018
Automation In Incident Response | IBM Resilient

Automation In Incident Response | IBM Resilient

IBM Resilient - 15 Dec, 2018
Mitre attack | IBM Resilient

Mitre attack | IBM Resilient

IBM Resilient - 14 Dec, 2018
Choice not Compromise: The Best of Both Worlds

Choice not Compromise: The Best of Both Worlds

James Petter - 14 Dec, 2018
Breaking Out Workflows part 1 & 2 | IBM Resilient

Breaking Out Workflows part 1 & 2 | IBM Resilient

IBM Resilient - 13 Dec, 2018
Threat Intelligence Platform | IBM Resilient

Threat Intelligence Platform | IBM Resilient

IBM Resilient - 12 Dec, 2018
Protecting your customers from persistent banking fraud

Protecting Your Customers From Persistent Banking Fraud

Zia Hayat - 12 Dec, 2018
Deploying containers securely and at scale with Multicloud Enabler powered by Red Hat and Juniper

Deploying containers securely and at scale with Multicloud Enabler powered by...

Bikash Koley - 11 Dec, 2018
Role Based Access Control (RBAC) | IBM Resilient

Role Based Access Control (RBAC) | IBM Resilient

IBM Resilient - 11 Dec, 2018
Crisis Management | IBM Resilience

Crisis Management | IBM Resilient

IBM Resilient - 10 Dec, 2018
The dangers of unsanctioned shadow apps

The Dangers of Unsanctioned Shadow Apps

Tim Bandos - 10 Dec, 2018

Sponsors

Popular Posts

Malware Mousetrap – how to catch a hi-tech hackerMalware Mousetrap – how to catch a hi-tech hacker
Compare the Cloud Launches the Disruptive Pitch TV ShowCompare the Cloud Launches the Disruptive Pitch TV Show
Security – Insight into IoT – Gemalto’s Joseph PindarSecurity – Insight into IoT – Gemalto’s Joseph Pindar
A Complete Overview of the Dell Technologies StackA Complete Overview of the Dell Technologies Stack
… Now it’s Docker on mainframes???… Now it’s Docker on mainframes???
Mainframe: The Ultimate Cloud PlatformMainframe: The Ultimate Cloud Platform
IBM scores 1 Billion Dollar Cloud Contract!IBM scores 1 Billion Dollar Cloud Contract!
Why the cyber security skills gap shortage is a boardroom issueWhy the cyber security skills gap shortage is a boardroom issue
May Top 50 #CloudInfluence IndividualsMay Top 50 #CloudInfluence Individuals
Beyond belief: imagining a world without open sourceBeyond belief: imagining a world without open source
Tweet
Share
Share
Cloud Computing, IoT, Big Data, Analytics, Social & Tech articles, key commentators, influence in the sector & global #CloudInfluence rankings.
Extolling the virtues and value of Cloud Computing to businesses.
Contact us: [email protected]

Random Articles

cloud vendor

Cloud Vendor Assessments | Done The Right Way

25 Nov, 2019
iPad

PaaS and Cloud-First in Web Content Management: What Marketers Need to...

27 Mar, 2017
Private Cloud Considerations for Multi-Cloud

Multi-Cloud – Is Your Private Infrastructure Ready?

24 Nov, 2017

Popular Videos

video

Behind the Expo interview with Nick Sacke from Comms365

23 Oct, 2017
Derek Dempseyvideo

AI and Financial Services – Let’s talk AI – FICO’s Derek...

24 Jul, 2017

Hybrid Multi Cloud – #Cloudtalks with Softcat’s Nick Barron

31 May, 2017
© 2018 COMPARE THE CLOUD LTD. All rights reserved.
This site uses functional cookies and external scripts to improve your experience. You can accept or decline cookies here.AcceptDeclineCookie Policy