New Jersey Power Failure Knocks Govt. off-line
January 25, 2013Enterprise Software: Startups Vs Established Brands
January 28, 2013Cloud computing is changing the structure of modern IT departments, who are frequently understaffed and overworked. However, everyone’s skeptical over cloud security. Before companies adopt custom cloud environments they must first find some reassurance of added security. DARPA steps in to help.
Cloud computing is changing the structure of modern IT departments, who are frequently understaffed and overworked.
However, everyone’s skeptical over cloud security. Before companies adopt custom cloud environments they must first find some reassurance of added security. DARPA steps in to help.
DARPA To The Rescue
If anyone has reason enough to launch a new cloud security program it’s the U.S. Department of Defense. Its vast data network controls everything from intelligence to air-force flight control. To the DoD a data breach could be a very big deal. That is why they have developed a Cyber-Targeted-Attack Analyzer program to help identify threats in cloud computing environments.
Going Beyond the Modern Firewall
DARPA’s Cyber-Targeted-Attack Analyzer comprehends the complex nature of inter-connects within an IT system in order to identify malicious attacks quickly. The process is automated and require no human direction. The Cyber-Targeted-Attack Analyzer will go a step further to tweak all the data systems during an attack to compensate for any loss of performance. DARPA says the Cyber-Targeted-Attack Analyzer will then translate its finding into standard code so humans can track what’s happening in the system.
Greater Cloud Security for Everyone
The Cyber-Targeted-Attack Analyzer program will go beyond the DoD, as more and more enterprises look for reassurance their data can be safely secured in the cloud. The main goal is to create a cloud environment that remains functional under attack. DARPA explains that the problem with the cloud is that there just isn’t enough perimeter security. High-speed networks connect to various unknown hosts – all of which is a bit a grey area to most folks. In order to secure information shared on a server dedicated to cloud networking, new standards and protocols must be established. Thankfully, a major government funded organization is hard a work finding more ways to secure cloud environments.