Can The RSA Conference Help Dispel Cloud Computing Security Fears?

Can The RSA Conference Help Dispel Cloud Computing Security Fears?

Cloud Computing Security Fears

It’s no secret that fear about security, or lack of it, is the major stumbling block ahead of universal adoption of cloud computing. While many of the concerns are unfounded, some do, in fact, have bases. I have addressed these issues, and some possible solutions, in an earlier article.. In fact, I have argued that cloud computing is no less safe than current technology out there, and sometimes, safer.

At the same time, it is clear that the public in general and the IT crowd in particular, can do with more assurance on this count. There’s a chance that the RSA Conference starting from 14 February at San Francisco can come up with some definitive answers to security concerns in cloud computing.

According to a pre-show analyst conference call on 9 February attended by several conference participants, cloud computing is set to hold center stage just like last year. Analyst firm Frost & Sullivan is also set to outline the current state of the cloud computing industry in their 2011 Global Information Security Workforce Study where they have interviewed more than 1,000 information security professionals across 100 countries.

Speaking on the study, Rob Ayoub, global program director at Frost & Sullivan, said that it revealed the need for greater education on cloud computing. Citing statistics, he said that 73% of respondents said they needed new skills to deal with cloud, 90% said they required a more detailed understanding of securing this technology, while approximately 50% of respondents expressed a desire to improve their contract negotiation skills with providers.

The RSA Conference is the premier gathering of information security professionals from across the world, who get together to discuss new developments and threats, and how to address them. The jury is still out on whether this one can address the outstanding issues on cloud computing security, especially since this is the second time that the cloud is the focus of this gathering.

Although several issues have been identified last year and solutions proposed, not many have seen the light of day. In fact, it is the popular opinion that people are not more confident about cloud computing than they were a year before. However, the sessions do give cause for hope, addressing as they are some of the most important issues. Some of the sessions planned for the five-day conference are “Cloud Computing Privacy and Security: The Legal, Ethical, Regulatory Framework”, “Private and Government Sectors: Why are Agencies Hesitant to Adopt Cloud?” and “Cloud Computing: A Brave New World for Security and Privacy.”

It is my opinion that an industry gathering like the RSA Conference offers a lot of potential for taking cloud computing to the next level. One thing that I would definitely like them to address is the lack of standards in the cloud computing space, about which I have written in an earlier article.

Secondly, I believe that the industry should try to co-opt the US government in its discussions. History has shown that any technology has a better chance of success with official support. After all, even from a pure business standpoint, the government is a major client, besides being of great help in dealing with regulatory issues.

In conclusion, I believe that yes, the RSA Conference can help address cloud computing fears; to expect them to be dispelled would be asking for too much.

By Sourya Biswas

Sorry, comments are closed for this post.

Comics
Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…