Can The RSA Conference Help Dispel Cloud Computing Security Fears?

Can The RSA Conference Help Dispel Cloud Computing Security Fears?

Cloud Computing Security Fears

It’s no secret that fear about security, or lack of it, is the major stumbling block ahead of universal adoption of cloud computing. While many of the concerns are unfounded, some do, in fact, have bases. I have addressed these issues, and some possible solutions, in an earlier article.. In fact, I have argued that cloud computing is no less safe than current technology out there, and sometimes, safer.

At the same time, it is clear that the public in general and the IT crowd in particular, can do with more assurance on this count. There’s a chance that the RSA Conference starting from 14 February at San Francisco can come up with some definitive answers to security concerns in cloud computing.

According to a pre-show analyst conference call on 9 February attended by several conference participants, cloud computing is set to hold center stage just like last year. Analyst firm Frost & Sullivan is also set to outline the current state of the cloud computing industry in their 2011 Global Information Security Workforce Study where they have interviewed more than 1,000 information security professionals across 100 countries.

Speaking on the study, Rob Ayoub, global program director at Frost & Sullivan, said that it revealed the need for greater education on cloud computing. Citing statistics, he said that 73% of respondents said they needed new skills to deal with cloud, 90% said they required a more detailed understanding of securing this technology, while approximately 50% of respondents expressed a desire to improve their contract negotiation skills with providers.

The RSA Conference is the premier gathering of information security professionals from across the world, who get together to discuss new developments and threats, and how to address them. The jury is still out on whether this one can address the outstanding issues on cloud computing security, especially since this is the second time that the cloud is the focus of this gathering.

Although several issues have been identified last year and solutions proposed, not many have seen the light of day. In fact, it is the popular opinion that people are not more confident about cloud computing than they were a year before. However, the sessions do give cause for hope, addressing as they are some of the most important issues. Some of the sessions planned for the five-day conference are “Cloud Computing Privacy and Security: The Legal, Ethical, Regulatory Framework”, “Private and Government Sectors: Why are Agencies Hesitant to Adopt Cloud?” and “Cloud Computing: A Brave New World for Security and Privacy.”

It is my opinion that an industry gathering like the RSA Conference offers a lot of potential for taking cloud computing to the next level. One thing that I would definitely like them to address is the lack of standards in the cloud computing space, about which I have written in an earlier article.

Secondly, I believe that the industry should try to co-opt the US government in its discussions. History has shown that any technology has a better chance of success with official support. After all, even from a pure business standpoint, the government is a major client, besides being of great help in dealing with regulatory issues.

In conclusion, I believe that yes, the RSA Conference can help address cloud computing fears; to expect them to be dispelled would be asking for too much.

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

What Futuristic Tech Will You See In Your Lifetime?

What Futuristic Tech Will You See In Your Lifetime?

Futuristic Tech The world and what people can do is increasingly being driven by technology. It has already shaped the world we live in, but over the next few decades it is set to shape the world in ways that we can barely imagine. There have already been some great leaps in IoT technology recently,…

The Lighter Side Of The Cloud – Hiding Spots

The Lighter Side Of The Cloud – Hiding Spots

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…