Mobile Tech Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 23 October 2013

The Unthinkable Risks of the Cloud!!!

Posted on 04:01 by Unknown
By mid-2013 – meaning now — cloud computing will be in use by about 80 percent of about 600 companies with at least 500 employees each,  according to a 2012 TNS Infratest survey. The trend is undeniable:  Data management and storage are moving offsite to cloud computing vendors on a vast scale.
Touting cloud computing as a way to eliminate the costs of buying and maintaining on-site information-technology assets, vendors offer it in the form of software as a service (SAAS), a distribution model in which software applications are delivered to clients over a web-based network. 
Offered in comprehensive, fully-integrated form, SAAS can serve the needs of entire companies through huge, web-based platforms.  As cloud computing rapidly becomes the delivery channel for software developers of all shapes and sizes to get their products to market, offering applications in a cloud is now the rule, not the exception.
A relatively small number of vendors have the service capacity to offer SaaS to big companies that want company-wide cloud computing.  The barriers to entry are formidable; only the best-capitalized vendors need apply.  Although market-share statistics are hard to come by, the list of companies large enough to offer cloud computing on this scale is short: Microsoft, Amazon, Google, Salesforce, Rackspace and not many others.
The concentration of data and virtual computing in the hands of relatively few vendors raises an important risk for their clients.  If the Internet-based systems of any one vendor are hacked, the result could be security breaches and invasions of privacy across entire industries in which their clients do business, creating liabilities on an almost unthinkable scale.
Can this small cadre of cloud-computing vendors adequately respond to the needs of their clients to quickly fix such a breach, restore services and, most importantly, cut off the damage to these clients’ own customers?
Can the balance sheet of any one of these vendors protect its clients from such losses and liabilities?
Could a company like Microsoft eliminate the risk of a virus being planted by a hacker in its Azure cloud computing product?  
If it can’t, will its balance sheet – as vast as it is – be enough to protect its clients against wholesale desertion by their customers? 
Don’t think such things can’t happen.  If hackers can penetrate the Department of Defense, the risk that they will penetrate Microsoft or Google cannot be ruled out.  Compromise of just one of these vendors – even one with a modest market share – conceivably could shut down, at least temporarily, a sizable slice of the U.S. economy.
Risk Aggregation
With such potential losses at stake, corporations are bound to think about hedging their exposures via cyber insurance. Yet even as insurance companies rush to meet the demand for cyber loss and liability insurance products, they worry about aggregation, the excessive exposure of a single insurer to a single catastrophic event, as Erich Bublitz recently pointed out in Carrier Management.
If the catastrophic event is a breakdown in just one of the handful of large cloud-computing vendors serving Corporate America, it is likely that no single cyber insurance tower could fully protect all of its clients.  
A vendor would have to buy staggering amounts of insurance limits to cover all data security and privacy liability exposure to its customers.  Cyber insurers and reinsurers worry about aggregation because a single catastrophic cyber breach at a single cloud-computing vendor could wipe out an entire tower (a layer of coverage above a company’s primary insurance policy) of cyber coverage, much like a superstorm can wipe out a whole region in its wake. 
The aftermath of such a crisis would not be pretty. Some of the biggest companies in the nation might be pitted against each other in competition for the vendor’s meager (compared to the scope of the loss) insurance proceeds — and, ultimately, its balance sheet. 
Shouldering the Burden Alone
To adequately manage risk, the clients of these vendors must recognize that as a practical matter, there probably isn’t enough cyber loss and liability insurance capacity available to cloud-computing service providers to fully protect their clients in such a scenario.
CFOs and risk managers can continue to request indemnity agreements from their vendors to gain faster access to their assets in the event of a catastrophic liability, but with a giant like Microsoft, this often isn’t an option.  Are there solutions available to one of the 80 percent of companies that has migrated to cloud computing but wishes to guard its business and its assets against a 100-year-flood cyber loss or liability event?
The short answer is this:  The cloud-computing client must shoulder the burden, largely alone, of protecting itself from liability to its own customers resulting from a vendor’s security breach or confidential data disclosure. 
The company may or may not be able to pass this expense on to the vendor in a service agreement.  Good cyber insurance is not inexpensive.  Buying cut-rate coverage from an insurance company inexperienced in this space, however, can lead to nasty surprises when the insurer ends up learning how to adjust a catastrophic cyber claim on the fly. 
To protect itself effectively against this kind of claim, companies need to create a coordinated effort between the risk and legal departments.  Consider these recommendations: 
Choose a cloud-computing vendor carefully.  The willingness and ability of the vendor to stand behind its products and services should be just as important as the functionality of those products and services. 
Engage a broker that has special expertise in cyber insurance.  Ask to meet the broker’s cyber risk team, and look for former underwriters of cyber loss and liability programs coming out of insurance companies known for competency in this field.
Evaluate the cyber catastrophe exposures exceeding a vendor’s and the company’s own insurance programs. That’s a vital part of enterprise risk management.  
Can the small cadre of cloud-computing vendors respond to the needs of their clients quickly enough to fix a breach?
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • EMC Defenders CTF - Week 3 - Contest 14 - Reversing
    I played the EMC defenders CTF with a few of my friends a while back. We sadly couldn't complete all the challenges. All the same it was...
  • AuthenTec co-founder discusses how Touch ID fingerprint reader evolved from early prototypes!!!
    AuthenTec co-founder F. Scott Moody recently stopped by his alma mater to deliver a  speech  about the company he helped launch. His company...
  • Hackers breach vBulletin support forum using zero-day vulnerability!!!
    A group of European hackers by the name of Inj3ct0r Team have taken  responsibility  for hacking the support forums of vBulletin.com and the...
  • ASRock unveils a pair of motherboards designed specifically for Bitcoin mining!!!
    Those looking to generate some extra cash by mining for Bitcoin now have a couple of new hardware options courtesy of ASRock. The motherboar...
  • Amazon's trio of biospheres gets two thumbs up from Seattle Design Review Board!!!
    Earlier this year Amazon  submitted a building proposal  to construct a series of massive biospheres in downtown Seattle adjacent to three o...
  • 20 Life Hacks and Tools to Boost Productivity on Your Computer!!!
    With the flood of  new technologies , websites, apps, news, work files, pictures, articles and the like, staying organized and focused is be...
  • Why and how to set up your own wiki with Dokuwiki!!!
    DokuWiki is a simple but versatile wiki. Find out how to install, configure, and begin using DokuWiki.  A couple of weeks ago, I had to set ...
  • Chrome used more than Firefox, Opera and Internet Explorer combined!!!
    Google Chrome is absolutely dominating the web browser market, at least according to social analytics firm  Shareaholic , which yesterday re...
  • A peek at the inside of Sony's PlayStation 4!!!
    See  what's inside the PlayStation 4 with these exclusive photos  Inside Sony headquarters, at the heart of Tokyo’s Shinagawa district, ...
  • Crysis developer releases free-to-play FPS browser game Warface!!!
    Crytek is well known for its graphically impressive and visually stunning games on PC and console, but now the developer is taking its exper...

Categories

  • 100
  • 12.04
  • 2.2
  • 2013
  • 21
  • 4848
  • 8080
  • add
  • alternative
  • analysis
  • android
  • apk
  • app
  • applet
  • applets
  • appletviewer
  • application
  • appsec
  • asmx
  • assembly
  • attack
  • attacks
  • basic
  • basics
  • beginner
  • blazeds
  • blog
  • book
  • books
  • breakpoint
  • breakpoints
  • browser
  • burp
  • CALL
  • capture
  • certificate
  • chain
  • cheops
  • client side
  • code
  • conference
  • console
  • content-type
  • coverage
  • CRLF
  • cross
  • crossdomain
  • csrf
  • ctf
  • customer service
  • database
  • deblaze
  • debug
  • debugger
  • decision
  • defcon
  • delete
  • deleting
  • dll
  • dogbert
  • dom
  • dynamic
  • element
  • emulator
  • encryption
  • engineering
  • entity
  • environment
  • example
  • executable
  • external
  • firebug
  • flash
  • flex
  • FlourineFX
  • flow
  • flowchart
  • forensics
  • fs
  • fuzz
  • glassfish
  • graph
  • handbook
  • harden
  • hash
  • hints
  • hit
  • hittrace
  • howto
  • IDA
  • idapro
  • IDB
  • immunity
  • in use
  • incremental
  • inetsim
  • injection
  • install
  • introduction
  • java
  • java.policy
  • javaee
  • javascript
  • jks
  • jump
  • keyboard
  • lab
  • loaderdata
  • malware
  • management
  • mapper
  • market
  • MD Description
  • MD FAQ
  • MD Technical Support
  • MD Updates
  • MD User Guide
  • md5deep
  • mount
  • msdn
  • network
  • newbie
  • olly
  • ollydbg
  • options
  • packet
  • password
  • pbkdf
  • pcap
  • peb
  • peb_ldr_data
  • penetration
  • pentest
  • permissions
  • phone
  • pkcs12
  • policytool
  • port
  • practical
  • procedure
  • proxy
  • resign
  • resignation
  • response
  • restrict
  • reverse
  • reversing
  • review
  • salt
  • same origin
  • sample
  • scripting
  • sdk
  • secure
  • security
  • set
  • setup
  • sharif
  • shortcuts
  • SI
  • signed
  • site
  • snapshot
  • soapui
  • source
  • splitting
  • ssl
  • start
  • static
  • steps
  • stunnel
  • superblock
  • support
  • test
  • thoughts
  • thread
  • tips
  • tool
  • tools
  • tor
  • trace
  • truecrypt
  • tutorial
  • ubuntu
  • umask
  • understand
  • university
  • unsigned
  • video
  • view
  • virgin
  • virtual
  • virtual box
  • virtual machine
  • virtualbox
  • vm
  • watch
  • web
  • web application
  • web service
  • work
  • wsdl
  • xhr
  • xml
  • xss
  • xxe

Blog Archive

  • ▼  2013 (496)
    • ►  November (143)
    • ▼  October (297)
      • Samsung fined $340,000 for online smear campaign a...
      • Google is experimenting with massive banner ads fo...
      • What is your best idea for an invention?!!!
      • Take a ride in a helium balloon to near-space for ...
      • New York City to retrofit 250,000 street lamps wit...
      • Chrome used more than Firefox, Opera and Internet ...
      • Leaked documents reveal NSA spied on the phone con...
      • Self-driving cars projected to reduce injuries by ...
      • Fon makes US debut, hoping to grow the Wi-Fi shari...
      • Japanese restaurant replaces waiters with conveyor...
      • Vine update finally delivers editing and draft mod...
      • Nexus 5 expected to debut October 31 in the US!!!
      • Germany proposes locked-down national internet aft...
      • This modified Lexus paints a unique portrait of it...
      • Moto X and LG G2 now available starting at $99 on-...
      • Comcast offering 25Mbps Internet, local channels a...
      • BlackBerry denies any involvement in questionable ...
      • New Firefox add-on allows you to see how, when and...
      • Samsung turns in another record-setting quarter wi...
      • PlayStation 4 will require a Day One update to ena...
      • Batman: Arkham Origins Review!!!
      • Amazon's trio of biospheres gets two thumbs up fro...
      • Google believed to be constructing a floating data...
      • Understanding Amazon's "profitless" business model!!!
      • World's first Bitcoin ATM to open in Vancouver thi...
      • LG announces G Flex with curved 6-inch display and...
      • SoapUI - Client side cert - Burp
      • The Unthinkable Risks of the Cloud!!!
      • Yahoo Tops Google In Web Traffic Again!!!
      • Yahoo Is Now Actually Beating Google In Traffic. H...
      • The Decline of Wikipedia!!!
      • De Blasio Outlines Plans To Curb New York's iPhone...
      • Apple announces iPad Air, iPad mini with Retina di...
      • Apple refreshes MacBook Pro Retina laptops with Ha...
      • 20 Life Hacks and Tools to Boost Productivity on Y...
      • Best Tablet Computers 2013!!!
      • Gaming Mice Roundup 2013: Corsair, Steelseries, Gi...
      • Google Quantum AI team releases quantum mechanics ...
      • Research team designs and builds a disk drive that...
      • Malware Alert: Downloading the "GTA V PC torrent" ...
      • TSA now starts its security check of passengers be...
      • Apple announces iPad Air, iPad mini with Retina di...
      • Apple refreshes MacBook Pro Retina laptops with Ha...
      • Apple's OS X Mavericks goes live today as a free d...
      • Crysis developer releases free-to-play FPS browser...
      • Microsoft is working on a Google Glass competitor,...
      • BlackBerry's new BBM app sees 5 million downloads ...
      • EA preparing a high-end Battlefield game for mobil...
      • Check out this bullet-time rig that uses 130 HTC O...
      • Nvidia has a Logan-powered Shield 2 console in dev...
      • Windows RT-based Nokia Lumia 2520 to take on the S...
      • Nokia announces 6-inch Lumia 1520, Lumia 1320, and...
      • Nvidia releases GeForce 331.58 WHQL drivers!!!
      • How to recreate the iOS 7 home screen and iPhone h...
      • Digital dating: One in 10 Americans have used an o...
      • John Carmack isn't convinced that Steam Machines w...
      • At least 10 million 'innocent' files destroyed in ...
      • Twitter expected to kill music app after just six ...
      • Leaked Intel roadmap shows Broadwell-K chips to ar...
      • LG reportedly creating its first Chrome OS devices!!!
      • Netflix in position to surpass HBO in paid subscri...
      • Nokia's phablet detailed in leak as Lumia range is...
      • Microsoft pulls Windows 8.1 update for Surface RT ...
      • BlackBerry resumes rollout of BBM for Android and ...
      • Apple expected to reveal retina iPad mini at tomor...
      • Verizon website glitch potentially exposed texting...
      • When Amazon's Customer Reviews Get Ridiculous and ...
      • Dell now accepting pre-orders for Windows 8.1, Bay...
      • Worldeye is the animated globe that offers a reali...
      • When Amazon's Customer Reviews Get Ridiculous (and...
      • Microsoft pulls Windows 8.1 update for Surface RT ...
      • Is Wikipedia for sale? Ubuntu 13.10 is out, Core i...
      • Nvidia bids adieu to V-Sync limitations with G-Syn...
      • Facebook app finally arrives for Windows 8.1 along...
      • repeat post: Windows 8.1 now available through Win...
      • SpaceX Grasshopper rocket launch filmed from aeria...
      • Verizon adds 1.1 million wireless connections duri...
      • Amazon's long-rumored smartphone could arrive via ...
      • Acer's second 8-inch Windows 8 tablet sees improve...
      • Microsoft to host Windows 8.1 'Ask Me Anything' se...
      • Samsung submits proposal to European Commission in...
      • Ireland's Department of Finance considers shutting...
      • AuthenTec co-founder discusses how Touch ID finger...
      • AT&T revealed as Tesla's mobile partner for in-veh...
      • Mapbox goes up against Google Maps with $10M in fu...
      • Motorola's new migration tool can preload the Moto...
      • Nexus 5 briefly appears on Play Store, 16 GB for $...
      • Apple iPhone 5s: The Geekysupport Review!!!
      • Samsung launches free Galaxy S4 battery replacemen...
      • Nvidia GeForce GTX 760 Ti appears as rebranded GTX...
      • Deep Web drug bazaar Silk Road set to become a Hol...
      • Neowin reviews Windows 8.1!!!
      • Nvidia GameStream transforms Shield into a serious...
      • AMD turns a profit in Q3 thanks to custom PS4, Xbo...
      • Elon Musk buys James Bond 'Lotus sub', plans to ma...
      • Security research firm says Apple can read your iM...
      • IsoHunt to shut down, pay MPAA $110 million!!!
      • Sony rolling out PlayStation 4 kiosks at select re...
      • Monthly video game sales rebound thanks to Grand T...
      • Researchers in China use light bulbs as a speedy a...
    • ►  September (51)
    • ►  August (2)
    • ►  March (1)
    • ►  January (2)
  • ►  2012 (16)
    • ►  October (3)
    • ►  September (1)
    • ►  August (4)
    • ►  June (1)
    • ►  May (4)
    • ►  April (2)
    • ►  February (1)
  • ►  2011 (22)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (9)
    • ►  June (1)
    • ►  May (2)
    • ►  April (6)
  • ►  2010 (8)
    • ►  August (3)
    • ►  April (2)
    • ►  January (3)
  • ►  2009 (6)
    • ►  December (6)
Powered by Blogger.

About Me

Unknown
View my complete profile