Back to the Medieval Future – Motte and Bailey 2.0
Will the Cloud be your garrison?
Organizational security divides and turf wars will continue to plague the woebegotten and forlorn until cybersecurity defenses are largely centralized. The unrelenting nation-state sponsored attacks will continue to be the largest (but not the only) cyber risk driving the cloud service bandwagon. The migration from maintaining an in-house perimeter to sheltering under the wings of a cloud based service is inevitable for individuals and organizations that do not have – or cannot counter – nation-state level resources. The defensive means for an asymmetric counter-attack using advanced methods including artificial intelligence will be primarily at the nation-state level. Although it is understood that aggressors of many sizes have already employed methods of AI. Thus the defensive risk is little changed from what drove the medieval militarization of Europe to the motte-and-bailey type castle plan, with moat optional. Only the sovereign could usually afford to construct such a garrison, maintain the soldiers to staff and patrol 24/7, provide shelter and defend the surrounding population during attacks. To be subject to such protection you had to reside within the realm of the sovereign and pay your taxes on time – or else. Thus, today there is a ready market for ‘sovereign’ cloud providers to construct comprehensive defensive stone and portcullis hardware, with software castellation. Such an online offering could be entitled, “Motte & Bailey 2.0”. Priced in Euros, of course. Cross bows, broad swords and maille armour, extra. Skeptical employee training via portal video war games, but in virtual reality format. Additional perks include exclusive VR international golf excursions for C-suite peerage members only. Back to the medieval future, sans DeLorean.
Commentary by Attorney Timothy F. Mills, Editor / Action Cyber Times™ © 2017 All Rights Reserved.
Action Cyber Times™ provides resources for cybersecurity, data privacy, compliance, breach reporting and risk management, intellectual property theft, and the utilization of emerging technologies such as artificial intelligence, machine learning, blockchain DLT, advances in cryptographic applications, and more.
Disclaimer: The content available on the web site and in the blog posts is for informational purposes only and is not intended to, and does not, provide legal advice. Contact and retain an appropriate professional for legal advice. Use of this content or any of the links contained within the site do not create an attorney-client relationship. The opinions expressed are the opinions of the author.