Saturday, June 1, 2013

Fox Business Coverage of Cyber Risks



I'd like to commend the Fox Business Network (FBN) for their regular coverage of cyber security topics.

Most recently, FBN dedicated an hour to a special report on cyber threats and emerging cyber security technologies in which both Vaultive and KoolSpan were featured. 



The special report included several segments:



'Threat 2K' (this is the report in which Vaultive and KoolSpan are featured):

'Hash Crash Backlash' (a report on the cyber threat to financial markets):

'At Risk' (a report on the cyber threat to critical infrastructure):

Cybersecurity roundtable 'Securing the Future':

Friday, May 17, 2013

Cloud Computing and Data Residency Laws: Irreconcilable differences?



Is it possible for companies take advantage of the cost efficiencies of cloud computing and still comply with the diverse set of international data residency laws?

Below is an article of mine that was just published in Cloud Computing.

Cloud Computing and Data Residency Laws

Cloud service providers store data all over the globe, and are constantly moving that data from one datacenter to the next for reasons as wide-ranging as cost considerations and redundancy requirements. Does this mean that the requirements outlined in varying data residency laws and privacy regulations are directly at odds with how cloud computing works?

The question is an especially delicate one when the cloud service provider stores and processes data in a jurisdiction that is perceived to have far less stringent privacy and data protection requirements - or may allow government agencies far broader data subpoena powers. Since the cloud computing model relies on distributed infrastructure to generate cost and flexibility benefits for customers, building a datacenter in each data residency jurisdiction quickly becomes cost-prohibitive. And, applying a set of constraints to the movement of data introduces an additional layer of complexity that further erodes the value proposition of cloud computing for customers.

Just as cloud computing represents a novel way of delivering IT computing and functionality, a new model for maintaining ownership and direct control of data in the cloud is increasingly required. However, this new model requires that the encryption mechanism is maintained externally and independently of the cloud service provider's environment, and that data is encrypted before it is sent to the cloud.

Here is the link to the rest of the article: Complete Article in Cloud Computing Journal

Wednesday, April 3, 2013

A New Approach to Cyber Defense

It is increasingly clear that cyber attacks imperil our national security and economic future. Yet while it is obvious that new defensive measures are needed, the remedies policy makers instinctively reach for are nearly all inappropriate. Scott Borg, Director and Chief Economist of the U.S. Cyber Consequences Unit, a non-profit research institute, and I wrote this article together to present a new approach for how we should think about cyber defense. Here is a link to the article published today on Fox Business: http://www.foxbusiness.com/technology/2013/04/03/new-approach-to-cyber-defense/