PRISM – A Fireball To The Advancing Public Cloud?

PRISM – A Fireball To The Advancing Public Cloud?

PRISM – A Fireball To The Advancing Public Cloud?

PRISM-Fireball

It’s all over the news. Blogs are filled with discussions, analysis – both critical and realistic but what’s clear is that no one is trying to justify it. The big question however, remains to be asked: What impact will PRISM has on the rapid advancement and penetration of public Cloud in our lives? Before we attempt to look at some of the possible ways the industry, specifically public Cloud service providers may choose to adopt, let’s briefly look at what PRISM really is.

It all started with Washington Post publishing a report on a secret Government (NSA?) program to fetch information on your communications, transactions and data directly from the datacenters of the big internet companies. There have been rumors floating around before WP published the report but the report added the needed fuel to the fire.

Among the companies which were reported to have granted unrestricted access to the Government bots to scoop data right from their servers were the big giants like Google, Microsoft and Apple. The post revealed that the documents it received indicated grant of “voluntary” access by these and 6 other big internet companies to query data. This would mean unrestricted access to terabytes, in fact petabytes of image, voice, textual and metadata formats of your personal data. The US Government was quick to respond to the report and clarify the even though PRISM does exist in some form, it does not spy on Americans, only foreigners and that all access to the data is approved and court supervised. You could imagine the importance of this clarification by the fact that Obama himself clarified this while he was in the middle of an important series of meetings with the new Chinese premier.

Tech giants were quick in rectifying and the executives themselves with Facebook’s Mark denying that he knew about PRISM and also clearly stating that no such access has been granted to any Government agency and that Facebook continues to uphold the privacy of its users.

In the backdrop of this huge privacy bubble, what would be its impact on the public cloud service providers? A strong statement coming from the top execs of the companies which were named in the report was the right decision and it did help but in the long run when there is already a heated debate on the true privacy and protection of personal data, which hundreds of millions of us, in fact billions, share through services hosted on the public cloud. Data residency on the cloud is still something which is evolving, with big enterprises showing growing interest for cloud security solutions that offer data encryption in-house before sending it off to the cloud. This new development will definitely add more energy into this direction.

By Salam UI Haq

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…