Virtualization Technology News and Information
Article
RSS
Gazzang 2014 Predictions: Four cloud security-related predictions for 2014

VMblog 2014 Prediction Series

Virtualization and Cloud executives share their predictions for 2014.  Read them in this VMblog.com series exclusive.

Contributed article by Larry Warnock, president and CEO, Gazzang

Four cloud security-related predictions for 2014

2013 will no doubt be known as the year in which the topic of data security left the datacenter and moved to the boardroom. From Edward Snowden and the NSA, to mass data breaches at Twitter, Facebook, Adobe and The New York Times (just to name a few) - one thing is clear, these security stories aren't simply going to disappear when the clock strikes midnight on December 31.

With that in mind, here are a few cloud security-related predictions for 2014: 
  1. NSA buzz may lessen, but data privacy concerns will skyrocket. Most people and organizations will realize they're not being targeted by the NSA; however, the residual effect of the spying scandal is that data privacy will become a scorching hot topic in 2014. A recent poll shows 86 percent of U.S. Internet users have taken steps online to remove or mask their digital footprints using a variety of methods, and more than 70 percent of E.U. citizens want to have more control over how their data is used online.

  2. Increased interest in alternative encryption technologies such as elliptic curve cryptography and homomorphic encryption. As data security needs grow, so too does the desire for lightweight data protection that remains with the data even as the data is in use. While I don't believe either of these encryption technologies will achieve critical mass in 2014, we will start to hear much more about them from key influencers and customers.

  3. Regulators will push for stricter governance of Bitcoins after an account-balance hack causes global markets to falter. Bitcoin's decentralized architecture means that it is the world's first completely open financial network - and subject to significant risk. Unlike fraudulent credit card charges or bank transactions that are regulated by law, there is no mechanism to recover lost or stolen bitcoins. Store them in a digital wallet on your hard drive and you risk drive failures, malware and user error. Entrust them to a third-party wallet service and someone could walk away with all of your mone

  4. Cars coming standard with browsers will prompt concerns about vehicle hacks. Someone hacking your computer can be an inconvenience, but someone hacking your car can be deadly. In a recent Senate hearing, David Strickland of the National Highway Traffic Safety Administration (NHTSA) said as electronic systems take over mechanical ones, attacks could travel via Internet connections, USB ports and mobile networks. Vehicle-to-vehicle (V2V) and vehicle-to-grid (V2G) communication technologies, as well as the advent of semi-autonomous vehicles, present additional potential for vulnerability.

##

About the Author

Larry Warnock is president and CEO of big data and cloud data security vendor Gazzang. He has more than two decades of operational expertise working with both startups and establishedtechnology companies, particularly in the enterprise software and data center tools markets.
Published Monday, December 16, 2013 6:35 AM by David Marshall
Comments
There are no comments for this post.
To post a comment, you must be a registered user. Registration is free and easy! Sign up now!
top25
Calendar
<December 2013>
SuMoTuWeThFrSa
24252627282930
1234567
891011121314
15161718192021
22232425262728
2930311234