Heroes Of The Cloud – Part 9

Heroes Of The Cloud – Part 9

Heroes of the Cloud – Part 9Cloud Heroes

A study of Cloud Computing should include not only the companies and entrepreneurs who have raised the Cloud from a concept to “the next big thing” in Information Technology. The study should also include those who have come to depend on the power of the Cloud.

Earlier in our look at the pioneers of Cloud Computing… (1 2 3 4 5 6 7 8) we partially defined “The Cloud” as a metaphor for the Internet. Another very workable definition would be that the Cloud is a tool for handling Big Data. Big Data is loosely defined as data sets that include from a few dozen terabytes to several petabytes. How much information is that? If you carry your contacts, pictures, music, games and files on an 8G microSD card in your smart phone, then 131,072 of your friends would need to combine their phones to equal a single terabyte.

Spy movies and James Bond gadgets aside, the national intelligence services are built around information, that is to say data. To perform their mission, a huge amount of information must be gathered, stored, analyzed, and eventually disseminated to the proper parties. At every stage, the information must also be protected ion the interest of national security.

While all of the intelligence services are in the information business, perhaps the most data intensive is the National Reconnaissance Office. The NRO develops and operates “overhead reconnaissance systems”. In other words, the NRO runs spy satellites.

The NRO is a hybrid organization composed of military members, Central Intelligence Agency staff, and DoD Civilian personnel. The NRO’s Chief Information Officer, , was recently awarded a Life Time Achievement “Legacy” Award from CloudNOW.

CloudNOW (Network of Women) is a non-profit consortium of leading women in Cloud Computing. The award was announced in conjunction with the March 2013 Women’s History Month Celebration.

Ms. Singer has held a number of Senior IT Leadership positions in the Federal Government. Previous to joining the NRO, she was Deputy CIO with the CIA, responsible for ensuring that the Agency had the Information Infrastructure necessary to accomplish its mission. Ms. Singer also served the State Department as the Director of Diplomatic Telecommunications Services.

With her background in the Intelligence service, Ms. Singer is intimately familiar with Cloud Security concerns. She writes Recent trends in cloud computing demonstrate the architecture has matured and offers distinct advantages for cyber security defense.

By Peter Knight

Sorry, comments are closed for this post.

Comics
Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…