The Lighter Side Of The Cloud – Global Warming
The Lighter Side Of The Cloud: Intelligence
The Lighter Side Of The Cloud – Keys To The Car

US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence

US Cyber Command Chief Gives Cloud Computing Security His Vote of Confidence

Even as cloud computing advances by leaps and bounds, security concerns remain. This issue has been addressed time and again by me in several articles. Even supporters of the cloud maintain that unless these problems are resolved, universal adoption will remain a dream.

Here are some older articles dealing with security on the cloud:

Recently, this point was specifically raised by the chairman of the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies, Rep. Daniel Lungren (California) who said how important it is “to have a promise that the security of the cloud is going to be measurably better than the security we have in the current system” (See: Homeland Security Subcommittee on Cybersecurity Conducts Hearing on Cloud Computing ).

At the Defense Advanced Research Projects Agency (DARPA) Cyber Colloquium held on 7 November in Washington DC, cloud computing got the vote of confidence from General Keith Alexander, commander of US Cyber Command and director of the National Security Agency (NSA). “We can argue over merits of cloud structure but we have found it is easier to secure the cloud. Thinking about the cyber issues that face us, coming up with a defensible system is important and cloud computing is one way to help make that possible,” he remarked.

Cyber terrorism and cyber crime featured prominently in his talk. According to him, the cost of such transgressions to the global economy is estimated at $1 trillion and malware is being introduced at a rate of 55,000 pieces per day. According to Regina E. Dugan, director of DARPA, 2004 had marked the first time that proceeds from cyber crime exceeded profits made from the sale of illegal drugs, and the problem is growing.

The vulnerabilities we face are extraordinary……what we see is a disturbing trend, from exploitation to disruption to destruction,” General Alexander observed. “We need defensible architectures and we have to change the way think about defending systems” He proposed increased collaboration between government agencies and private companies in the realm of cybersecurity and cloud computing, with the first steps already been taken (See: Knowledge Sharing on Cloud Computing Between Government and Public Sectors  and US Military Asks for Private Sector’s Help to Understand Cloud Computing).

The fact that NSA, the premier US intelligence agency is actively looking at security issues and has reposed its faith in cloud computing augurs well for the technology.

By Sourya Biswas

sourya

Sourya Biswas is a former risk analyst who has worked with several financial organizations of international repute, besides being a freelance journalist with several articles published online. After 6 years of work, he has decided to pursue further studies at the University of Notre Dame, where he has completed his MBA. He holds a Bachelors in Engineering from the Indian Institute of Information Technology. He is also a member of high-IQ organizations Mensa and Triple Nine Society and has been a prolific writer to CloudTweaks over the years... http://www.cloudtweaks.com/author/sourya/

Sorry, comments are closed for this post.

Popular Archives

The History Of Back-Ups

The History Of Back-Ups

The History of Back-Ups There’s no doubt about it – we are spoilt. With external hard-drives, CDs, USB memory sticks, SD cards, online storage and multiple devices with vast memories we can save, access and back up our data more easily and more efficiently than ever before. (Image Source: Maxim Yurin, SoftLogica)  It’s not always been…

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats

Cloud Infographic: Corporate IT Security Stats Each week on CloudTweaks we provide a few shoutouts to companies who provide engaging and interesting infographics that reflect our readers interests.  In this case, we have an excellent infographic provided by the team at arellia.com which takes a closer look at cyber-security and some of the biggest malware threats…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker Docker started as just a software container on top of a Linux operating system which seemed like a simple optimization for a fat hypervisor. Its disruptive force however comes from the fact that it does force us to rethink many of the layers of the cloud stack. Starting from the way we…

The Cloud In 2015: Eight Trends To Look For

The Cloud In 2015: Eight Trends To Look For

The Cloud In 2015 For organizations of all sizes, in 2014 the cloud emerged as a critical part of the default consideration set when implementing any new application – in large part due to the cloud’s proven ability to handle data storage and processing demands in an elastic manner, improved verifiable standards around data security and…

Recent

Is The Internet of Things A Perfect Storm?

Is The Internet of Things A Perfect Storm?

Is The Internet of Things A Perfect Storm? There has been a great deal of discussion surrounding the Internet of Things over the past couple of years as more companies are taking an active and aggressive interest. IBM for example has recently decided to invest $3 Billion over the next 4 years. “Our knowledge of…

Digital Transformation: Miracle and Wonder

Digital Transformation: Miracle and Wonder

Digital Transformation These are the days of miracle and wonder. I’ve been leading a small, global research team at the Tau Institute for the past few years to examine the dynamics of IT adoption in more than 100 countries throughout the world. We’ve developed several indices that show how well these nations are doing on a relative basis. We ranked the nations…

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Contact Us

Sending

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising