US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence

US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence

Even as cloud computing advances by leaps and bounds, security concerns remain. This issue has been addressed time and again by me in several articles. Even supporters of the cloud maintain that unless these problems are resolved, universal adoption will remain a dream.

Here are some older articles dealing with security on the cloud:

Recently, this point was specifically raised by the chairman of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Rep. Daniel Lungren (California) who said how important it is “to have a promise that the security of the cloud is going to be measurably better than the security we have in the current system” (See: Homeland Security Subcommittee on Cybersecurity Conducts Hearing on Cloud Computing ).

At the Defense Advanced Research Projects Agency (DARPA) Cyber Colloquium held on 7 November in Washington DC, cloud computing got the vote of confidence from General Keith Alexander, commander of US Cyber Command and director of the National Security Agency (NSA). “We can argue over merits of cloud structure but we have found it is easier to secure the cloud. Thinking about the cyber issues that face us, coming up with a defensible system is important and cloud computing is one way to help make that possible,” he remarked.

Cyber terrorism and cyber crime featured prominently in his talk. According to him, the cost of such transgressions to the global economy is estimated at $1 trillion and malware is being introduced at a rate of 55,000 pieces per day. According to Regina E. Dugan, director of DARPA, 2004 had marked the first time that proceeds from cyber crime exceeded profits made from the sale of illegal drugs, and the problem is growing.

The vulnerabilities we face are extraordinary……what we see is a disturbing trend, from exploitation to disruption to destruction,” General Alexander observed. “We need defensible architectures and we have to change the way think about defending systems” He proposed increased collaboration between government agencies and private companies in the realm of cybersecurity and cloud computing, with the first steps already been taken (See: Knowledge Sharing on Cloud Computing Between Government and Public Sectors  and US Military Asks for Private Sector’s Help to Understand Cloud Computing).

The fact that NSA, the premier US intelligence agency is actively looking at security issues and has reposed its faith in cloud computing augurs well for the technology.

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/
FacebookTwitterLinkedInGoogle+Share

3 Responses to US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Popular

Top Viral Impact

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery

Cloud Infographic – The Power Of Cloud Disaster Recovery Preventing a Cloud Disaster is one thing. Recovering from a disaster is a whole other area of concern. Today’s infographic provided by CloudVelox outlines some best practices and safeguards in order to help your business make more informed decisions. About Latest Posts souryaSourya Biswas is a

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving

Hewlett-Packard Company On-Demand Webinar

Hewlett-Packard Company On-Demand Webinar

Shifting Workloads and the Server Evolution Learn more about the latest industry trends and the challenges customers are talking about. Every ten to fifteen years, the types of workloads servers host swiftly shift. This happened with the first single-mission mainframes and today, as disruptive technologies appear in the form of big data, cloud, mobility and