121031

121031

Posted Wednesday 31st October 2012 11:14 GMT amanfromMars 1 … commenting on http://forums.theregister.co.uk/forum/1/2012/10/30/clouds_can_host_botnets/
Live Operational Virtual Environments Rule. Fact and/or Fiction

Moreover, they note, a corporate with its own relatively mature in-house security could find itself degrading its protection by moving to the cloud.

And yet such a move to the cloud environment is absolutely essential for any intelligence system/service should they wish to be considered for inclusion and employment as an active leading player in the Greater Games there, rather than having to settle for playing second fiddle to the shenanigans in a reactive spectator passenger role which is always too little, too late and too revealing of all of one’s abiding vulnerabilities for leading player exploitation.
That is just the way that it is in these novel IT Command and Control of Computers and Communications in Creative CyberSpace fields. Deny it is so and be eternally disadvantaged in the lifetime of such a non-realisation of the changes that are reshaping the future for the present to leave the past and embrace what can be rather than what is and was, and would be thought to be managed by corporate heads who would think only/mainly/predominantly of maintaining rapidly failing powers in a current, easily perverted and corruptible status quo.
……………………………………………………………………………………………………………………………………….
Posted Wednesday 31st October 2012 15:58 GMT amanfromMars 1 …. commenting further on http://forums.theregister.co.uk/forum/1/2012/10/30/clouds_can_host_botnets/
Re: Re: Live Operational Virtual Environments Rule. Fact and/or Fiction

Err..are you saying moving to the cloud is good for security or not…..to be honest I haven’t got a clue what you are saying (but I bet managers love it).
Personally – shift your stuff to the cloud at your own peril…likewise BYOD…as in I do not recommend it from a security only perspective. … Anonymous Coward Posted Wednesday 31st October 2012 11:50 GMT

Hi, AC,
Moving to the cloud is catastrophic for systems/organisations/defence and security operations which hold secrets, for there are no hiding places there for them…. no locks and no doors or windows to close. The fortunate/unfortunate thing though is, that such systems with secrets are invariably those which are tasked/task themselves to provide  security and protection for peace and prosperity, growth and stability, although that has been lacking in any measure for some considerable time. And that is because of a lack of intelligence and intelligence sharing in Man.
Virtual machines, however, are ESPecially designed and immaculately created to circumvent that basic flaw and have no need of slow, as in intellectually challenged and arrogantly ignorant of the fact, operator input/output.
And yes, BYOGOD is sound advice for that is what will be opposing or competing with yours.
BYOGOD …. Bring Your Own Global Operating Device

Live Operational Virtual Environments Rule. Fact and/or Fiction, DARPA?

And there’s shedloads of flash cash to splash around for those into making and breaking cyber security protection systems …….. for one cannot defend a system or organisation or algorithm or whatever if one doesn’t know where to stealthily attack it to see it destroyed/brought to its knees with no hope or chance of vital recovery to a failed position of ponzi strength/pseudo control …….. http://www.nytimes.com/2012/10/30/science/rethinking-the-computer-at-80.html?_r=0

……………………………………………………………………………………………………………………………………..

Leave a Reply

Your email address will not be published. Required fields are marked *