Networking

09:12 AM
Connect Directly
RSS
E-Mail
50%
50%

Cloud Security A Moving Target

Cyber-Ark’s fifth annual "Trust, Security and Passwords" report surveyed 1,422 IT staff and C-level professionals across North America and Europe, the Middle East and Africa (EMEA), and found that nearly one in five C-level respondents admit insider sabotage had occurred at their workplace. Another 16% believe that competitors may have received highly sensitive information or intellectual property--including customer lists, product information and marketing plans--from sources within their

By 2015 the global cloud computing market will reach $121.1 billion. IDC says that businesses are more concerned about the risks involved-- including security, availability and performance--than with the benefits of flexibility, scalability and lower costs. According to a recent survey of more than 1,000 security professionals in the InformationWeek Analytics 2011 Strategic Security Survey, the cloud is here to stay, especially for small and midsize companies, and so, too, are concerns about cloud risk. The survey shows that the No. 1 worry is security defects in the technology used by cloud providers--that is, the virtual machines, networks and databases powering the services that are used.

That's followed by the second most pressing concern, unauthorized access to, or leakage of, customer data. In addition, respondents said they were worried that big cloud vendors like Amazon and Microsoft may significantly change their offerings without notice, and that could affect security controls and technology requirements.

The good news, says John Pironti, president of IP Architects, is that security professionals have been grappling with the issues poised by the cloud for decades. This is the third time the industry has had to deal with what he calls time slicing, and it goes back to the days when mainframes ruled the IT roost. "It started out with mainframes, and they did it better, but they didn't have the depth and breadth of applications we have today. In this case, we're using software ... where, with mainframes, [security] was designed in the hardware."

However, the problems are pretty much unchanged, he says, with one of the first goals of cyberterrorism being to attack communications. "The same fundamental attack and threat problems are the ones that will still get you. The adversaries are smarter, better, but they will follow the same basic approach ... follow the value."

While the human asset is your greatest asset, it's also your greatest adversary, says Pironti. "Most companies are having problems dealing with that trusted employee. ... It is a much greater threat than the external hacker."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Cartoon
Hot Topics
7
IT Certification's Top 10 Benefits
Global Knowledge, Global Knowledge,  8/20/2014
2
Why Large Data Centers Need Overlay Networks
Cisco Press, Publishing Alliance,  8/21/2014
2
Real-World SDN, Lesson 2: Conquer The Enemy Within
Symon Perriman, Senior Technical Evangelist, Microsoft,  8/25/2014
White Papers
Register for Network Computing Newsletters
Current Issue
2014 Private Cloud Survey
2014 Private Cloud Survey
Respondents are on a roll: 53% brought their private clouds from concept to production in less than one year, and 60% ­extend their clouds across multiple datacenters. But expertise is scarce, with 51% saying acquiring skilled employees is a roadblock.
Video
Slideshows
Twitter Feed