Skip to content

RSA: the Premier Security Conference for security professionals, tackles Clouds

Cloud image representing how we work online
Cloud image representing how we work online
As surveillance becomes more robust, cybercriminals become more profound – forcing a persistent innovation of security strategy at all major tech corporations.

This is the message of RSA 2009 – a week-long Security summit happening now in San Francisco.

Cisco Systems unveiled multiple strategies all geared toward Cloud Computing: Cisco Security Cloud Services. Ambika Gadre, director of product marketing in the security technology business unit at Cisco outlined their Cisco Security Cloud Services called “SensorBase,” a massive threat-monitoring network overseen by 500 workers in its Cisco Security Intelligence Operations center. “Cloud Computing” has become the security tech catch phrase that encompasses all social media networks that you and I probably take part in every day.

And just what is “Cloud Computing” you ask? Cloud computing refers to common business applications online that are accessed from a web browser while the software and data are stored on servers. Cloud is used as a metaphor for the internet, based on how it is depicted in computer network diagrams and basically represents a seamless user interface supported by an invisible complex infrastructure. Hackers can make good use of these systems to access delicate information and irrevocably damage network security. And though a string of cyberattacks have successfully targeted financial institutions, department store credit accounts, and individuals, Adi Shamir, a computer science professor at the Weizmann Institute of Science in Israel maintains that, “If the government has extra money to spend they should spend it on regulating the financial markets and not spend it on regulating cybersecurity,”

I’m not so sure I agree with Adi. As more and more people migrate all forms of sensitive data to the internet I’m convinced that security issues will only get larger – with more accomplished cyberattackers waiting in the wings. What do you think?


Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: