Digitally Savvy Companies Outperform their Peers.

Digitally Savvy Companies Outperform their Peers.

So Do Gender Diverse Organizations. Imagine the Implications of Linking Both. You can’t hide from it. High performance enterprises are digital and gender diverse. Too bad they are a minority. Here’s a step in the right direction. The statistics are pretty staggering. MIT research reveals that companies
Determining the Economic Value of Data

Determining the Economic Value of Data

[Note: I have been trying to write this blog for several years.  But instead of trying to perfect the concept, perhaps the best approach is to simply put the idea out there and let it percolate amongst my readers.  My University of San Francisco Big Data MBA

CONTRIBUTORS

Four Trends and Realities Confronting Security Today

Four Trends and Realities Confronting Security Today

Realities Confronting Security Today, the number of attempted data breaches, cyber attacks, and other bad behavior by bad actors continues ...
Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience - it's a lot like running a triathlon and ...
How Machine Learning Quantifies Trust & Improves Employee Experiences

How Machine Learning Quantifies Trust & Improves Employee Experiences

Machine Learning Quantifies Trust Bottom Line: By enabling enterprises to scale security with user behavior-based, contextual intelligence, Next-Gen Access strategies are ...

RESOURCES

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects ...
Machine Learning Open-Source Tools

Do More With Machine Learning Thanks to These 6 Open-Source Tools

Machine Learning Open-Source Tools We are in the middle of a machine learning, AI and big data renaissance — at least, that’s what we’re calling it. Seemingly everyone is interested in this technology these days, and for a good reason ...
real time hacking attacks

Live Real Time Hacking and Ransomware Tracking Maps Online

Real Time Hacking Attacks We've recently covered a few real time hacking maps but have decided to extend the list based on the recent ransomware activities with some additional real time hacking attack and ransomware tracking maps. Ransomware refers to malicious ...
gregness

Cloud Migration and Cyberwar

Cyberwar Concerns

This last week the Washington Post published a bombshell story on the recent attacks on the US election infrastructure ironically under their motto “Democracy dies in darkness.

On the Vidder blog Thursday I said that we were at cyberwar.  My case was simple:

  • Cyber warfare is by nature stealth;
  • There are no cyber-specific treaties;
  • The migration of attacks from economic targets to political suggests direct nation state complicity; and
  • Now our intel agencies have proven direct Russian intel agency involvement.

Then a recent Reuters report broke that made things even more bleak: Russian officialsare demanding source code from US tech companies, even code for security products.

Reports are now emerging of a hack attack against UK’s parliament, another political target.

A pattern of increasing attacks against servers and devices and politically motivated targets is emerging and Russia named as the common source.

See this recent Wired piece on Ukraine: How an Entire Nation Became Russia’s Test Lab for Cyberwar.

For years many security experts have attacked cloud adoption, calling it a security risk. Yet recent events might accelerate cloud adoption, especially for legacy workloads protected by US tech giants flirting with releasing source code to have (ironically) greater access to the Russian market.

Even the perception of a source code sharing risk could dampen enthusiasm for traditional security products and get more CISOs considering protection by AWS, Azure or Google, who are investing billions in advanced infrastructure and might have enough market power to resist Russian demands.

Some of these companies are under tremendous operating pressures and having to fight off innovative startups and IaaS offerings that are catching up if not surpassing (in terms of security) for most enterprises. Some are struggling with layoffs designed to right the ship.

Now there is a source code risk that could give Russian hackers enhanced access to enterprise systems increasingly exposed by digitalization and growing populations of endpoints with network access.

Time will tell.  IMHO cyberwar could be a significant new driver for the growth of cloud for existing, premises workloads.

By Greg Ness

Cloud Syndicate

The 'Cloud Syndicate' is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics.

Contact us for syndication details on how to connect your technology article or news feed to our syndication network.

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.