Cloud computing a 'security nightmare,' says Cisco CEO
'Swamp computing' might be a more appropriate name, says one security expert
IDG News Service - If anyone has the right to be excited about cloud computing, it's John Chambers. But on Wednesday, the Cisco Systems Inc. chairman and CEO conceded that the computing industry's move to sell pay-as-you-go computing cycles available as a service on the Internet was also "a security nightmare."
Speaking during a keynote address at the annual RSA security conference, Chambers said cloud computing was inevitable, but that it would shake up the way that networks are secured.
"You'll have no idea what's in the corporate data center," he said. "That is exciting to me as a network player. Boy, am I going to sell a lot of stuff to tie that together."
However, he added, "It is a security nightmare and it can't be handled in traditional ways."
Cloud computing is a hot topic here at the security conference in San Francisco this week. Big computing companies like Cisco and IBM are eager to talk about it, but security experts see a lot of work ahead.
"I think it's really going to be a focal point of a lot of our work in the cybersecurity area," said Ronald Rivest, an MIT computer science professor and noted cryptographer, speaking during a conference panel Tuesday. "Cloud computing sounds so sweet and wonderful and safe ... we should just be aware of the terminology, if we go around for a week calling it swamp computing I think you might have the right mind-set."
Rivest added that he was optimistic about cloud computing's future, but that it was going to take "a lot of hard work" to make it secure.
Show attendees haven't bought into the concept either.
"I'm not seeing a huge benefit in the cloud for us," said Bruce Jones, chief information security officer at Kodak, speaking in an interview.
One of the main problems is that Jones doesn't want to give up control of sensitive data to a nebulous cloud-based computing architecture. For long-term computing projects, it's probably cheaper to simply buy the hardware, he said, although cloud computing could work on a small scale at Kodak.
"It's a pilot or an R&D project where they want to do something and they need some kind of on-demand scalability; it's good for that as long as you don't care about the confidentiality of the data," Jones said.
As data moves onto the cloud, Cisco's security services will become even more important, and the company's ability to dig in and inspect data moving on and off corporate networks will become even more critical, said Tom Gillis, vice president of marketing with Cisco's security technology business unit.
"The move to collaboration, whether it be video or the use of Web 2.0 technologies or mobile devices is really dissolving the corporate perimeter," Gillis said. "This notion of security as a line that you draw in the sand ... that notion is just gone."
And it's not going to come back. Chambers said that his company's use of Web 2.0 technologies such as video blogging and conferencing has mushroomed in the past year. In the first quarter of 2009, Chambers held 262 meetings, he said. Two hundred of them were virtual, using Cisco's TelePresence system. "It's got to be secure as we do this," he said. "This is our lives."
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts