The Tech Titans are Crushing Our Freedoms! Our Democracy! Our Very Humanity!!! Oh…Get Over It.

The Tech Titans are Crushing Our Freedoms! Our Democracy! Our Very Humanity!!! Oh…Get Over It.

Well the Zuckmeister has done his dance in front of Congress. Guess what? Nothing is going to happen, nothing ever does. Stop sweating it. History shows you’ll be fine. Zuck confirmed that most of our representatives don’t have a clue about how the internet or
Leading Multicloud Strategies

What’s Ahead for Cloud in 2019

The Cloud In 2019 2018 was an incredible time for cloud. Its impact on customer experiences, business processes and models, and workforce innovations was undeniable. We saw more and more use cases where customers started leveraging multiple clouds to enable innovation than ever before. But

Cyberwar Concerns

This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically under their motto “Democracy dies in darkness.

On the Vidder blog Thursday I said that we were at cyberwar.  My case was simple:

  • Cyber warfare is by nature stealth;
  • There are no cyber-specific treaties;
  • The migration of attacks from economic targets to political suggests direct nation state complicity; and
  • Now our intel agencies have proven direct Russian intel agency involvement.

Then a recent Reuters report broke that made things even more bleak: Russian officialsare demanding source code from US tech companies, even code for security products.

Reports are now emerging of a hack attack against UK’s parliament, another political target.

A pattern of increasing attacks against servers and devices and politically motivated targets is emerging and Russia named as the common source.

See this recent Wired piece on Ukraine: How an Entire Nation Became Russia’s Test Lab for Cyberwar.

For years many security experts have attacked cloud adoption, calling it a security risk. Yet recent events might accelerate cloud adoption, especially for legacy workloads protected by US tech giants flirting with releasing source code to have (ironically) greater access to the Russian market.

Even the perception of a source code sharing risk could dampen enthusiasm for traditional security products and get more CISOs considering protection by AWS, Azure or Google, who are investing billions in advanced infrastructure and might have enough market power to resist Russian demands.

Some of these companies are under tremendous operating pressures and having to fight off innovative startups and IaaS offerings that are catching up if not surpassing (in terms of security) for most enterprises. Some are struggling with layoffs designed to right the ship.

Now there is a source code risk that could give Russian hackers enhanced access to enterprise systems increasingly exposed by digitalization and growing populations of endpoints with network access.

Time will tell.  IMHO cyberwar could be a significant new driver for the growth of cloud for existing, premises workloads.

By Greg Ness

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

TOP ARCHIVES

The Connected Car: The Unknown Hero of Automotive Innovation

The Connected Car: The Unknown Hero of Automotive Innovation

Connected Car Innovation Spanning the last decade, the automotive industry has seen an explosion of technological innovation which has, and ...
4 Examples When AI And Robotics Work Better Than Humans

4 Examples When AI And Robotics Work Better Than Humans

Robotics and AI Science fiction’s portrayal of robotics and AI tends to be pessimistic when it comes to machines developing ...
5 Technology Wishes for the New Year: Ending the debate around cloud v. on-premise

5 Technology Wishes for the New Year: Ending the debate around cloud v. on-premise

5 Technology Wishes for the New Year In the spirit of all that’s holly and jolly, I’m sharing my top ...
GDPR Compliance: A Network Perspective

GDPR Compliance: A Network Perspective

GDPR Compliance Regulations can be a tricky thing. For the most part, they’re well thought out in terms of mandating ...
Why Open Source Technology is the Key to Any Collaboration Ecosystem

Why Open Source Technology is the Key to Any Collaboration Ecosystem

Open Source Collaboration Ecosystem Open source – software whose source code is public and can be modified or shared freely ...
Infographic - Internet of Things (IoT) Will Be Top Technology Investment

Infographic – Internet of Things (IoT) Will Be Top Technology Investment

Internet of Things Investment Investors are jumping all over the opportunities abound when it comes to the Internet of Things and Big Data. There is simply way too much money at stake to ignore the potential that is going to truly ...
Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration – 10 ‘Do it Right’ Tips

Cloud Migration Tips Businesses continue to adopt the cloud at break neck speed. Inherent benefits like lower operational costs, no infrastructure overheads, and quick access to better technology make cloud a very attractive proposition for businesses, especially start-ups and SMEs ...
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked ...

CLOUD PROGRAMS

Certificate Program: Essentials of Cybersecurity

Certificate Program: Essentials of Cybersecurity

What You'll Learn: Describe the vast array of roles and sectors within the Cybersecurity industry; Explain the relationship between management and technology in cybersecurity protection; Identify appropriate types of security controls to the actions of different and evolving threat actors; ...

$396.00 $356.40Learn More

CISSP® Exam Prep Course

CISSP® Exam Prep Course

The CISSP® Exam Prep Course prepares test-takers for the Certified Information Systems Security Professional exam, as administered by the International Information System Security Certification Consortium (ISC)2. The CISSP® certification is recognized worldwide and adheres to the strict standards of ISO/IEC ...

$549.00Enroll Now

Cloud Community Supporters

(ISC)²
AWS
HPE
CA Technologies
Cisco

Cloud community support comes from sponsorship, service opportunities and collaborative network partnership initiatives.