Feeds

The DoD's very cloudy thinking over Gmail

Let's get physical

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

In the wake of the Google vs. China dustup, we’re starting to see some discussion of the greater implications for computing, both in general and the cloudy Google way.

The fact that some Gmail accounts were accessed by hackers looking for dissidents raises some questions about the security of Gmail specifically and the entire cloud model as well.

I’ve always felt that security is one of the biggest concerns with the entire cloud concept. While cloud providers are increasingly paying attention to allaying customer concerns about data security, they aren’t (and really can’t) provide guarantees.

There isn’t a cloud supplier in the world who will agree to compensate a customer for the losses arising from security breaches or associated downtime. This is completely understandable; it’s hugely difficult to objectively value the cost of a security breach.

But there are situations where the stakes are higher than mere money. Take the US Department of Defense, for example. I was shocked to find out that Gmail is an accepted email alternative for official use. To me, this opens up all sorts of bad scenarios. Of course Google does its best to protect customers, but some things simply shouldn’t be stored outside firewalls. I put a significant percentage of DoD communications into this category.

This guest blog from Paul Strassman, an Information Sciences professor at George Mason University, makes a point that is often overlooked: physical security in the data center.

In his view, an agent with bad intentions, some technical skills, and access to the data center could tap unencrypted communications with physical wiretaps placed between systems. Is this far-fetched… or entirely possible? To me, a non-expert in security, it sounds spookily plausible.

If you read the article, be sure to read the comments section to see a spirited discussion ... one of my favorites is the first one, where a reader asks, “DoD using Gmail?!?... Is that not like placing a Kwikset bathroom lock on the access doors to a missle silo?!?”

Certainly something to think about and discuss.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
The cloud that goes puff: Seagate Central home NAS woes
4TB of home storage is great, until you wake up to a dead device
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
Intel offers ingenious piece of 10TB 3D NAND chippery
The race for next generation flash capacity now on
Want to STUFF Facebook with blatant ADVERTISING? Fine! But you must PAY
Pony up or push off, Zuck tells social marketeers
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.