Is 2015 Going to Be the Year of the Breach? Cyber Security for Cloud Computing
Following the Cold War, the Soviet Union provided international access to its secret nuclear research towns in a bid for transparency; American pundits then circulated a story that the Soviet Union’s nuclear program consisted of one reel-to-reel tape recorder-cum-launch sequencer. Nuclear stand down? Just unplug. With the shift toward cloud computing and government cloud security […]