Principles of an Effective Cybersecurity Strategy

According to MetricStream’s, ‘The State of Cyber Security in the Financial Services Industry’ report, around 66 percent of financial services institutions have faced at least one cyber-attack in the last 12 months. The cost of this can even result in a complete shutdown of the business."

Click To See - 10 Live Hacking Tracking Maps

ARM Proposes Innovative Cloud Security Solution

ARM Proposes Innovative Cloud Security Solution

After Edward Snowden exposed the US government’s ingenious plan to monitor every major web platform in existence, including Facebook, Twitter and even Microsoft, trust in Cloud Storage security has come down to an all time low. However, with Google coming with a free encryption service for its clients, UK-based IT manufacturer ARM has come up with an even more innovative solution to protect your cloud data.

On August 15, Google announced that it would provide a free 128-bit encryption service for data stored in the Cloud Service. However, one major fallacy in that announcement was that it was VIP-access only, as only enterprise clients would be provided with the new service. This left the common users in the same dilemma as they were before. Furthermore, it meant that the same platforms like Facebook and Twitter were given the service who failed to protect their personal data in the first place, whereas the common user were left to grieve for a better solution.

However, ARM CTO Mike Muller believes there is a far easier, delicate solution to the problem, as he revealed ARM’s plans for introducing a microcontroller to cloud data for security and protection purposes during an interview with the Forbes magazine.

Microcontrollers are not a cutting-edge technology- ATM cards and security passes have long been using them for validation and better protection of their data. The same technology can be used in cloud data security as well, and the ARM CTO tells you how.

As we accumulate data on the cloud, based on the amount, a certain number of tokens would be generated which can be accessed by the user only. As the tokens would be spent, it would make the data inaccessible for anyone, thus requiring much more effort for anyone trying to snoop in on the data. And with the system spread everywhere, spying on your data in the cloud storage would be next to impossible.

However, the move is yet to see any sort of fruition as ARM’s proposal is yet to sink in with the IT community. Nonetheless, in the near future, the proposed token system, in an advanced form, might do wonders to protect data on the Cloud Storage for every common user out there.

By Blake Adams

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in cloud connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as technology related infographics and comics.