gregness

Cloud Migration and Cyberwar

Cyberwar Concerns

This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically under their motto “Democracy dies in darkness.

On the Vidder blog Thursday I said that we were at cyberwar.  My case was simple:

  • Cyber warfare is by nature stealth;
  • There are no cyber-specific treaties;
  • The migration of attacks from economic targets to political suggests direct nation state complicity; and
  • Now our intel agencies have proven direct Russian intel agency involvement.

Then a recent Reuters report broke that made things even more bleak: Russian officialsare demanding source code from US tech companies, even code for security products.

Reports are now emerging of a hack attack against UK’s parliament, another political target.

A pattern of increasing attacks against servers and devices and politically motivated targets is emerging and Russia named as the common source.

See this recent Wired piece on Ukraine: How an Entire Nation Became Russia’s Test Lab for Cyberwar.

For years many security experts have attacked cloud adoption, calling it a security risk. Yet recent events might accelerate cloud adoption, especially for legacy workloads protected by US tech giants flirting with releasing source code to have (ironically) greater access to the Russian market.

Even the perception of a source code sharing risk could dampen enthusiasm for traditional security products and get more CISOs considering protection by AWS, Azure or Google, who are investing billions in advanced infrastructure and might have enough market power to resist Russian demands.

Some of these companies are under tremendous operating pressures and having to fight off innovative startups and IaaS offerings that are catching up if not surpassing (in terms of security) for most enterprises. Some are struggling with layoffs designed to right the ship.

Now there is a source code risk that could give Russian hackers enhanced access to enterprise systems increasingly exposed by digitalization and growing populations of endpoints with network access.

Time will tell.  IMHO cyberwar could be a significant new driver for the growth of cloud for existing, premises workloads.

By Greg Ness

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

Long term thought leadership contributors will not show up under the 'Cloud Syndicate' section as they will receive their own custom profile on CloudTweaks.

How Leading Organizations are Leveraging Big Data

How Leading Organizations are Leveraging Big Data

Seeing The Big Data Picture “Data will talk to you if you’re willing to listen”— Jim Bergeson. Few can dispute ...
Inside the Equifax Hack

Was the Data Just Too Big? Inside the Equifax Hack

Inside the Equifax Hack Equifax is a gigantic financial organization, the entire livelihood of which revolves around collecting and analyzing ...
Big Data Career Opportunities

Big Data Analytics Career Job Opportunities

Big Data Career Opportunities With the inception of Big Data, we have witnessed a data revolution around us.  Big data ...
Big Data and Autism

Can Big Data Help Us Create a Medical Test for Autism?

Big Data and Autism Many mysteries surround autism spectrum disorder. Arguably, one of the largest is how to authoritatively diagnose ...
Mobile Data Traffic Explosion: Explore IoT, 5G, & VR Opportunities

Mobile Data Traffic Explosion: Explore IoT, 5G, & VR Opportunities

Mobile Data Traffic Explosion The technology revolution of the 21st Century has opened the avenues towards many possibilities. We now ...
Contrary to popular belief, a pro-privacy stance is good for business

Contrary to popular belief, a pro-privacy stance is good for business

Pro-Privacy Stance Right now privacy is a hot topic on LinkedIn posts, especially as it pertains to compliance with the ...
Network security in the era of hybrid cloud

Network security in the era of hybrid cloud

Hybrid Cloud Network Security Protecting networks and the data that traverses them might seem to be an impossible task these days ...
5 Cloud-Based Customer Service Trends

5 Cloud-Based Customer Service Trends

Customer Service Trends Customer service has become the new battleground in today's marketplace. In fact, 97 percent of customers around ...
Case study: How HCI-powered private clouds accelerate efficient digital transformation

Case study: How HCI-powered private clouds accelerate efficient digital transformation

The next BriefingsDirect cloud efficiency case study examines how a world-class private cloud project evolved in the financial sector. We’ll now learn ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, ...