CIA Demolish Cloud Security Concerns: All Systems Go

CIA Demolish Cloud Security Concerns: All Systems Go

CIA Demolish Cloud Security Concerns: All Systems Go

It’s been one of the last mountains to climb for cloud computing. With the technology’s steady implementation over the last few years, as it has exponentially grown in size and popularity, it seems that one by one each drawback or wide commercial concern has been unceremoniously knocked down. As a result, more and more companies have headed cloudwards. Despite this though, many cloud skeptics still pace the floor and stroke their chins raising worries and issues chiefly regarding security; after all, storing your entire company in something that is not defined by a physical object is quite the leap to take. It seems though, the CIA has decided to change all that.

The news that the Central Intelligence Agency have opted for an incredibly weighty cloud contract with AWS is initially quite the shocker. One does not typically envisage the CIA utilizing the kind of services you or I might use, and upon hearing that they’ve done so, we may start to consider who their Broadband provider is, or if they get their shopping home delivered from Walmart. Still, idle day dreaming aside, whilst the information is worthy of a fervently raised eyebrow to say the least, when we start to think about what this might mean for cloud computing on a global scale, it becomes a lot more compelling.

The question is if the CIA, a department with an enormous amount of power, based on an enormous amount of knowledge, knowledge stored in data, data which is now kept in the cloud; if this operational method is secure enough for an intelligence giant, shouldn’t it be secure enough for all of ussecurity?

Indeed, security is going to have been a chief concern for the CIA when they were deciding how to store their data, and it’s pretty safe to assume they are not going to have taken the plunge without a heady bout of painstakingly meticulous research, that presumably gave them the confidence to say yes, and no doubt terrified the poor assistant making the sale.

Of course, the cloud brings other advantages that the CIA will no doubt be wanting to take advantage of; with their data stored where any operative or employee can get at it, that means the entire organization is suddenly more portable. It means they can keep a track of exactly what’s going on and why no matter where they happen to be; out in the field, in the office, or somewhere between the two as secret agents often are. Gus Hunt himself pointed out how the true worth of any information can be measured only by the corresponding information it’s connected to. “Since you can’t connect dots you don’t have, it drives us into a mode of, we fundamentally try to collect everything and hang on to it forever” he said, and what this means is, the CIA need to hold on to reams and reams of data for extended periods of time; in the commercial world, it’s big data they’re after.

So, the summary. Where does this news really lead? We’ve been talking about the explosion of the cloud for a long time, and whilst it sometimes feels like it’d be more closely associated with someone dropping a steadily increasing amount of those little things that went bang when you threw them on the floor then an explosion as such, this might usher in a reversal of that sentiment altogether. With many holding fire on making the leap due to security precautions, will this be the final endorsement of the cloud’s potential that those companies still waiting need? We will have to wait and see.

By Rob Vicars

This article was written by Rob Vicars on behalf of Giacom. For Hosted Exchange solutions that deliver a complete carry-through to the cloud, Giacom are the answer! 

Note: CloudTweaks publishes news and opinion articles from several different contributors. All views and opinions in these articles belong entirely to our contributors as outlined in our disclaimer.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…