{"id":16572,"date":"2014-04-18T00:44:04","date_gmt":"2014-04-18T04:44:04","guid":{"rendered":"http:\/\/www.opensource.im\/?p=16572"},"modified":"2014-04-18T00:44:04","modified_gmt":"2014-04-18T04:44:04","slug":"snowden-effect-has-changed-cloud-data-security-assumption-survey-claims","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/nsa-spying\/snowden-effect-has-changed-cloud-data-security-assumption-survey-claims.php","title":{"rendered":"&#8216;Snowden Effect&#8217; has Changed Cloud Data Security Assumption, Survey Claims"},"content":{"rendered":"<p><p>    Techworld  Edward Snowden's revelations of    sophisticated NSA spying have made many senior IT staff    distinctly edgy about their use of the cloud with nine out of    teen now paying close attention to the location of stored data,    a survey of global    attitudes has found.  <\/p>\n<p>    [ A Look    at the Fallout From the 2013 Snowden Leaks ]  <\/p>\n<p>    Teasing out the effect of Snowden on IT teams that are already    cagey about the immaturity of the cloud is no mean feat. Have    his revelations changed behaviour on the ground?  <\/p>\n<p>    In NSA Aftershocks, NTT Communications found that nine out of    ten of the 1,000 decision makers it asked in the UK, US, Hong    Kong, France and Germany believed that Snowden has had some    effect on their approach to the cloud.  <\/p>\n<p>    In just over half of cases, more attention was being paid to    where data was stored geographically, with just under half    carrying out more due diligence on cloud projects. Around 35    percent said they'd changed their procurement policies for    cloud providers with 62 percent stating that the revelations    had stopped them from moving ICT into the cloud.  <\/p>\n<p>    So Snowden is affecting behaviour on the ground, but it's still    not clear whether some of this isn't natural wariness as people    get to grips with the inevitable risks of using remote cloud    providers.  <\/p>\n<p>    For instance, 97 percent of respondents said they preferred    data to be kept within their own region, something that is    particularly true for EU enterprises. But this is as likely to    be driven by data sovereignty and compliance worries; even    without Snowden this would have been an issue and it could just    be that the reality of the NSA's capabilities has brought home    the need to justify security procedures.  <\/p>\n<p>    The view of some vendors is that encryption can be used to    enforce data security but this is not easy to implement to the    degree necessary to stop surveillance. It is also expensive and    comes with a performance overhead.  <\/p>\n<p>    Medium term, provider security is still likely to become a    selling point.  <\/p>\n<p>    \"ICT decision-makers have been quick to learn from the current    crisis and now understand how to scrutinise providers. Those    suppliers that can live up to the increased demands for data    integrity, governance and security will find success in the    post-Snowden world,\" noted NTT Communications' authors.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more from the original source:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.cio.com\/article\/751632\/_Snowden_Effect_has_Changed_Cloud_Data_Security_Assumption_Survey_Claims?source=rss_news\/RS=^ADAApNw8p52TaLPPtIn63isA0BEZvQ-\" title=\"'Snowden Effect' has Changed Cloud Data Security Assumption, Survey Claims\">'Snowden Effect' has Changed Cloud Data Security Assumption, Survey Claims<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Techworld Edward Snowden's revelations of sophisticated NSA spying have made many senior IT staff distinctly edgy about their use of the cloud with nine out of teen now paying close attention to the location of stored data, a survey of global attitudes has found. [ A Look at the Fallout From the 2013 Snowden Leaks ] Teasing out the effect of Snowden on IT teams that are already cagey about the immaturity of the cloud is no mean feat. Have his revelations changed behaviour on the ground? <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[],"class_list":["post-16572","post","type-post","status-publish","format-standard","hentry","category-nsa-spying"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16572"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=16572"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/16572\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=16572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=16572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=16572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}