I try to keep up on some of this cloud technology and security. I know everyone has an argument on both sides. I am somewhere in the middle, "I drink the Kool-Aid while wearing the tin foil hat"
I just read an article about cloud security and it brings up some good points I had not thought about. One that in a program like Onshape there are no files. Users are just working on the file there is no onshape format they can download. So if it is true that most security breaches are started internally then this seems to be a good solution. Since users never have access to the file. They can't download it to a USB to take home. Export can be disabled so they can't get a dumb solid. You can track everyone who has viewed the file. Here is a like to the entire article. Just thougth it was interesting view. It was obviously written from OnShpae's point of view, but still some good point are made.
A couple of months ago I read a article in Modern Machine Shop about IoT and industry 4.0
One point they also eluded to was machine destruction. What if the hackers goal was not to steal your info but to wreck your machines. What if they could change the parameters in your FusionCAM files to create a machine crash.
Interesting times with some real challenges.
I just read an article about cloud security and it brings up some good points I had not thought about. One that in a program like Onshape there are no files. Users are just working on the file there is no onshape format they can download. So if it is true that most security breaches are started internally then this seems to be a good solution. Since users never have access to the file. They can't download it to a USB to take home. Export can be disabled so they can't get a dumb solid. You can track everyone who has viewed the file. Here is a like to the entire article. Just thougth it was interesting view. It was obviously written from OnShpae's point of view, but still some good point are made.
A couple of months ago I read a article in Modern Machine Shop about IoT and industry 4.0
One point they also eluded to was machine destruction. What if the hackers goal was not to steal your info but to wreck your machines. What if they could change the parameters in your FusionCAM files to create a machine crash.
Interesting times with some real challenges.