Welcome!

Agile Computing Authors: Liz McMillan, ManageEngine IT Matters, Lori MacVittie, Elizabeth White, Srinivasan Sundara Rajan

Related Topics: Microsoft Cloud, Containers Expo Blog, @CloudExpo

Microsoft Cloud: Article

Is Using the Cloud Information Security Suicide for Enterprises?

Connectivity is here to stay and I hope the Sarah Palin hack helps us think about the human elements

The CTO Blog

On the face of it, the apparent hacking of Sarah Palin’s Yahoo mail account may have hurt the cloud’s onward march into enterprise credibility. By using services in the cloud to hold corporate data, as opposed to within our corporate walls, the concern is we are automatically exposing the corporate to additional risk. And it is a concern we must take seriously. But this is far from the full story. Computer hacking is as old as computers, and social engineering as old as, well, people.

With thanks to the head of enterprise architecture of one of the organizations I’m collaborating with for sharing the link, here’s a well written perspective on the hack itself. I’ve also had a couple of colleagues mention, quite rightly, that this high profile event serves as a timely reminder for us to think very carefully about the cloud’s enterprise viability.

The argument often goes that by definition a service in the cloud has ubiquitous potential access for both the authorised and the hackers alike, whereas the corporate network has restricted access (to employees) and so hacking is intrinsically harder.

The reality is somewhat different.

In fact, when you assume any real level of connectivity (and which business can afford not to be connected), the security model of the Web is intrinsically more secure than the security model pre-Web most corporates have in place today – ask your trusted security expert about application centric and moat security compared with document centric and de-perimeterisation security.

Many years ago, the best and brightest security experts figured out that, while there are many levels of security (as they went on to describe in the Orange Book), if you want the best level of security over your data, you have to put your computer in a bunker with cameras recording who uses it and whatever you do you never ever, under any circumstances, connect it to a network.

Back in the mainstream world, the technical aspects aren’t perhaps the most important factors here. The real issue is not with the cloud, it is of course with us, the ‘wetware’.

Let’s flip this around and imagine for a moment you’ve responsibility for information security for your organisation. (Go on, really try it…!)

Imagine it’s your first day in the job and you’re sat in front of a big, horizontal slider control.

It’s the security control for the corporation and it can be set to ‘default deny’ – which means no-one can do anything unless they have explicit permission signed in triplicate and approved by a corporate bureaucracy prized for its ‘beware of the leopard’ signs, or default allow which means anyone can access and share absolutely anything, and everyone is given 24 hour access to a good corporate lawyer.

The slider is set bang in the middle. On the left the label says ‘default deny’, and on the right label says ‘default allow’.

Which way do you move the slider and how far?

This is perhaps one of the toughest decisions faced by corporate and government information security policy makers - just where does security policy start on this security continuum?

What we do know is that too much technical security is as risky as too little – perhaps even more so. When corporate IT takes too much of a default deny stance, people getting on with their jobs tend to find workarounds which unwittingly weaken security.

If you’ve been following events in the UK recently, memory sticks come very much front of mind.

In the end, people tend to behave more responsibly when given more responsibility. And not connecting to the world for a business or government is a non-option. So for me, if I had my hands on the lever, we'd embrace the cloud while sliding the slider to the right. This might sound like information security suicide, but I think it’s the way go.

But wherever you’re at personally in the debate, connectivity is here to stay and I hope the Sarah Palin hack helps us think about the human elements before we get too lost in the technical mist of the cloud.

More Stories By Carl Bate

Carl Bate is Vice President & UK Chief Technology Officer, Capgemini. He contributes to The CTO blog. He is a leading contributor to Capgemini’s thought leadership in business technology and also helps facilitate Capgemini’s IT leadership community - a community of ex-CIOs, CTOs and IT Leaders who’ve personally faced the challenges of IT in business - whose goal is to provide support to executives and their leadership teams. Prior to the CTO role at Capgemini Carl ran its Technology Consulting business (TCG). Bate is co-author of the book ‘Lost in Translation’ - a 5-star rated handbook designed to offer new, practical insights to business and technology leaders seeking to make a step-change difference in addressing the ‘business/IT divide’ – www.LiThandbook.com.

Carl is a fellow of the British Computer Society and chair of its Futures Group.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...