More and more companies are turning to cloud computing services

Source: Internet
Author: User
Keywords Cloud computing network security

According to foreign media reports, Microsoft's former chief security officer and White House Network security Advisor Schmidt (Howarda.schmidt) recently received an interview that "bad guys" on the internet-hackers, cyber-criminals and cyber-fraudsters, Their Internet attacks are increasingly organized and targeted. As companies begin to turn to cloud services, these companies are wary of the network security problems they have faced, and are making them more cautious lest they fall into the same trap in the future. The Information security Forum may give itself the name of the world's leading independent IT security organization, but it doesn't matter. It is important that the companies and institutions serviced by the information Security Forum members increasingly rely on the forum's computer security expertise. Schmidt's job is to provide door-to-door services to organizations and institutions seeking network security. He has a history of 40 years of experience in the field of government and private cyber security, working in the U.S. Air Force, and later into the Air Force Office's Special Investigation department and the FBI Drug Information Center, where Schmidt began entering the field of cyber-court and cyber-security. In the latter job, Schmidt's success in exploring cybercrime has made him a pioneer in the field, with a reputation in sight. After leaving the government agency, Schmidt became the chief security officer of Microsoft and ebay. After the 9.11 terrorist attacks, he once again entered the government agency, acting as a White House cyber security advisor. Schmidt also became America's first cyber-security "dictator". Schmidt became chairman and chief executive officer of the Information Security Forum in 2008. Recently, he received a technewsworld in Vancouver, and Vancouver is also the Information Security Forum 20th World Congress held. The following are the main features of his interview: Technewsworld: What guidance and requirements do you have for members of the Organization to better respond to the latest IT security threats at this conference? Schmidt: I think it has a lot in common with the other things we deal with around the world. Whether it is a small Nordic country or developed Western countries, the way the cyber attacks are the same, the solution is the same. Move from technology to risk sequencing management, which is consistent among all our members. Technewsworld: The Internet is an American invention, and the world's top internet elites are mostly working for American companies. So, do you think that some countries will follow the United States in dealing with cyber security? Schmidt: No, it's totally different, actually, it's interesting. At the beginning people mastered the technology, and then people put this technology to a level to reach the information technology, and finally, the information technology has been upgraded to a level of information security space. I think people all over the world have shown unquestionable wisdom in this process. I think the difference is that the United States is taking steps to respond to informationIn the area of security, other countries are also looking at how the United States handles these issues when laying down infrastructure. Subsequently, the countries said: "We do not want to take the same path, we need to take another different approach." "For example, strengthening verification-the idea of using user IDs and setting passwords is a big problem." So they will go on another path. Technewsworld: Members of your forum are from companies, government departments and law enforcement agencies. What is the trend for bad people on the internet-these guys may be putting malware on the web? Schmidt: It's clear that the villains on the Internet are quite different than they were 5 years ago. As the internet is becoming an economic carrier, the Internet and other aspects of society are basically indistinguishable, and the villains certainly know that. They will steal your money over the Internet without going to your neighborhood or being arrested. When you resort to international law, some countries have laws on internet crime and fraud, while others are still in their infancy. Therefore, the situation is very different. The other question I want to talk about is how do you protect cyber crime and fraud? This depends on the protection of your IT systems, your own, your country, or your company's spending on the internet. The United States has been the target of phishing and fraudsters, because the US spends a lot on the Internet. Now, other countries will say: "We will invest in the net according to the size of GDP, but we will not give the bad guys the opportunity." In addition, hackers are more targeted and organized in cyber attacks. Technewsworld: More and more companies are turning to cloud computing services. Our data in cloud computing represents our trust in more people. You can get the data in the cloud from a wireless device such as a smartphone. In my opinion, the company should have the obligation to ensure the security of cloud data. Do you think those companies are serious about this? Schmidt: These members of our Forum are here (Vancouver). It was a period of economic depression, but all of our members came. This shows that these companies are willing to send staff to attend the meeting, they are very serious about this matter. I want to be specific about cloud computing. Over the past few years we have had considerable experience with internet viruses, malware, verification of authentication, theft of IDs, and so on. Now, cloud computing is coming, and it says it's not going to go through that. So when they sign cloud computing, they want good encryption, to make sure that there is a specific line in the cloud that will define where their data is going.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.