Journal: Life in the Cloud–Repeating Past Mistakes

Communities of Practice, Ethics, IO Secrets, Key Players, Mobile, Policies, Real Time, Threats
Full Story Online

January/February 2010

Security in the Ether

Information technology's next grand challenge will be to secure the cloud–and prove we can trust it.

By David Talbot

Phi Beta Iota: The story is so good we will not extract from it.  It must be read in its entirety.  Government is failing to do its job, leaving a “wild west” environment alive and corruptible in the cloud.  Standards are beginning to emerge but security is not a priority and the end-user as the ultimate source of the security is not even being considered (over ten years ago Eric Hughes conceptualized anonymous banking and end-user controlled encryption of all data).  Eventually, after great expesne and great loss of data, government and industry may realize that the ultimate security is that which originates with the individual end-user, not a central service that can be hacked by disgruntled insiders or that can make a mistake that instantly explodes tens of millions of clients.  Below is the original Mich Kabay slide, still relevant.

Mich Kabay's Threat Slide Link Leads to NSA Las Vegas Briefing

Financial Liberty at Risk-728x90