US cyber chief says cloud computing can manage serious cyber threats
Network World - WASHINGTON, D.C. -- The security of cloud computing is often debated but such debates seem to be over for the general tasked with running the United States military's cyber command, who sees the technology not only as way to rein in IT costs but a way to more easily protect IT assets.
Speaking here before 700 security-minded attendees at the DARPA Cyber Colloquium, Gen. Keith Alexander, who is commander of U.S. Cyber Command and director of the National Security Agency, said he needs look at the cloud environment he is testing out at the NSA.
"We can argue over merits of cloud structure but we have found it is easier to secure the cloud," Alexander said. Thinking about the cyber issues that face us, coming up with a defensible system is important and cloud computing is one way to help make that possible.
Alexander says cloud computing helps bring the notion of a single defensible system together by eliminating the hodgepodge of computing "enclaves," as well as eliminate inefficient IT costs. For example, with its cloud implementation, the NSA has reduced system administration costs by 50% and reduced the number of help desks from 900 to 2.
The reasons IT needs to improve cybersecurity are obvious. "The vulnerabilities we face are extraordinary," Alexander said. The cost of cybercrime to the global economy is estimated at $1 trillion, Alexander stated, and malware is being introduced at a rate of 55,000 pieces per day. Look at what's going on regarding theft of intellectual property -- it is being stolen at the largest rates in history, he said.
"We need defensible architectures and we have to change the way think about defending systems," he said.
Follow Michael Cooney on Twitter @nwwlayer8 and on Facebook.
Read more about wide area network in Network World's Wide Area Network section.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Maximize Strategic Flexibility by Building an Open Hybrid Cloud Choosing how to build a cloud is the biggest strategic decision IT leaders will make this decade. It determines their organizational competitiveness, flexibility,...
- ESG: The IBM FlashSystem 840: Technical Evolution to Deliver Business Value In this whitepaper, you will learn how this high-speed storage technology has tremendous potential to support I/O-intensive and/or latency-sensitive applications.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources... All Cloud Computing White Papers | Webcasts