By David Jevans | Article Rating: |
|
August 15, 2008 03:30 PM EDT | Reads: |
33,954 |

Think about all of the critical data and IT systems that are moving into the cloud these days. Consumer credit reporting, enterprise CRM and sales force automation, customer support systems, banking and stock trading, foreign exchange, DNS management, email security… the list goes on and on, and it is only going to accelerate. Imagine if any one of the above services that you or your company uses were accessed by a hacker or competitor.
Greg Conti, an Assistant Professor of Computer Science at the US Military Academy in West Point, gave a talk at Defcon last week about the dangers of cloud computing. “The information we are all giving to online companies is massive and dangerous and [security's] going to get worse before it gets better.” This has spurred renewed debate in the security industry about strong authentication on the Internet as more and more critical services move into the cloud.
One example was a blog posting of mine earlier this week where where Wells Fargo passwords for using a credit reporting server were somehow stolen, and identity thieves used those access codes to get onto the MicroBilt credit reporting site and mine the personal data, social security numbers, etc of over 7,000 people.
Had this cloud service required the use of authentication tokens or digital certificates in addition to a username and password, this type of breach would not have been possible.
Think about all of the critical data and IT systems that are moving into the cloud these days. Consumer credit reporting, enterprise CRM and sales force automation, customer support systems, banking and stock trading, foreign exchange, DNS management, email security… the list goes on and on, and it is only going to accelerate. Imagine if any one of the above services that you or your company uses were accessed by a hacker or competitor.
The Information Systems Audit and Control Association has released a statement that two-factor authentication systems connected to encrypted communications can secure Internet connections to cloud computing-based services.
“our belief is that, with the right technology, the new generation of cloud computing system can be made as secure — if not more secure — than existing server-based office systems” said Sarb Sembhi, president of the ISACA London Chapter.
My personal belief is that all Internet services that have personal or business information should offer strong 2-factor authentication to their users and customers.
Published August 15, 2008 Reads 33,954
Copyright © 2008 Ulitzer, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
Related Stories
- What's the Difference Between Cloud Computing and SaaS?
- Cloud Computing Expo: Introducing the Cloud Pyramid
- Cloud Computing - The Jargon is Back!
- Marketing the Cloud Computing Paradigm Shift
- Cloud Computing Expo - Deploying Into the Clouds: Concepts, Benefits and Experiences
- Cloud Computing Expo - The World Wide Cloud: Bridging the Data Center and The Cloud
- "Cloud Computing Expo" Call for Papers Now Open
- Trusting the Cloud: Timing and Adoption of Cloud Technologies
- SYS-CON's Cloud Computing Expo Will Be Larger Than Any Recent Gartner Event
- Cloud Computing - Morgan Stanley is Banking on the Cloud
- Merrill Lynch Estimates "Cloud Computing" To Be $100 Billion Market
- A Brief History of Cloud Computing: Is the Cloud There Yet?
- Joyent CEO to Present on "The Open Cloud" at SYS-CON's Cloud Computing Expo
- Blog-City.com Founder Alan Williamson to Present at SYS-CON's Cloud Computing Expo
- Cloud Computing & Privacy: Would You Trust Amazon?
More Stories By David Jevans
David Jevans is the Chief Executive Officer of IronKey, based in Los Altos, California. He is also the Chairman and Founder of the Anti-Phishing Working Group, the leading non-profit organization dedicated to eradicating identity theft and fraud on the Internet. The APWG has over 1,500 member companies and agencies worldwide. Membership is limited to banks and other financial institutions, ISPs, law enforcement agencies and security technology vendors.
Jevans has over 10 years of business experience in the Internet security industry, and has founded two high-tech startups, been through IPO, mergers and acquisitions.
- Cloud People: A Who's Who of Cloud Computing
- The Future of Cloud Computing
- Cloud Expo New York Call for Papers Now Open
- Cloud Expo 2011 East To Attract 10,000 Delegates and 200 Exhibitors
- The Cloud Computing Kettle Heats Right Up
- Did Google's Eric Schmidt Coin "Cloud Computing"?
- SYS-CON's 1st International Cloud Computing Conference & Expo: Show Report
- Cloud Computing Is Far More Than Just Cutting Enterprise IT Costs
- Amazon, Google, Microsoft - Big Three Cloud Providers Examined
- Ray Ozzie: Who Can Keep Microsoft From "Growing Old Inside"?