Superb Internet Facebook Superb Internet Twitter Superb Internet Google Plus Superb Internet printerest Subscribe to Superb Internet's blog RSS feed

More on ISIS Sending Tweets as US Central Command During Obama Speech

  • Security

This looks at a second major combative political hack since the Monday before Thanksgiving, when the Sony hack was announced. It is a follow-up to our initial coverage on the Central Command hack.

  • An Awful Movie
  • Twitter Threats
  • Creepy Contact Information & Plans
  • Obama Roasted at FTC
  • Conclusion

An Awful Movie

After making critical comments following the Sony hack of an awful movie that Sony Pictures should have paid Americans to watch, The Interview, President Obama has now been drawn directly into the debate over cybersecurity.

When the studio announced that it would not be releasing the movie since the big cinema chains pulled out (after threats of attacks reminiscent of “the 11th of September 2001”) , Obama said of Sony, “I think they made a mistake.” Obama wanted a strong stance against North Korea. The FBI has said that the Sony hackers were affiliated with the North Korean government, and Slate has said that skeptics of Pyongyang involvement are misguided.

Now the Islamic State (ISIS) took the President and federal government on directly. The YouTube and Twitter accounts for US Central Command were hacked on January 12, while Obama was speaking on cybersecurity at the FTC.

Twitter Threats

Here’s a basic timeline of Twitter’s resolution of the incident, as provided by John Constine of TechCrunch:

12:29 PM EST – ISIS posted its first tweet.

12:46 PM EST – Politico’s Hadas Gold tweeted that Twitter was taking steps to dismantle the terrorists’ access.

1:05 PM EST – The fraudulent images within the account, uploaded by ISIS, were removed.

1:10 PM EST – @CentCom was completely disabled.

1:15 PM EST – Brett LoGiurato of Fusion tweeted that the Department of Defense had verified the intrusion, saying, “We can confirm that the U.S. Central Command Twitter account was compromised earlier today.”

1:35 PM EST – The YouTube account was disabled.

2:55 PM EST – Matt Navarra of The Next Web tweeted that the publication was working with the Pentagon to help it close a security loophole.

The attackers sent out five tweets as Central Command in the short window of time during which they controlled the account. Many social media experts would probably say that’s a surefire road to Twitter burnout, regardless your level of zeal and delusion.

The Twitter and YouTube hacks were claimed by Cyber Caliphate, an organization associated with the decapitation crew ISIS. Cyber Caliphate opened the year by taking over the Twitter accounts of local news outlets in New Mexico, Maryland, and Tennessee. ISIS threatened Twitter in early 2014 when its account was suspended for posting videos of journalists and aid workers being beheaded in the Middle East.

Creepy Contact Information & Plans

The tweets linked to a Pastebin page that contained a lengthier message. “We know everything about you, your wives and children,” it said in part. “US soldiers! We’re watching you!”

The message also indicated that the data had been stolen from Central Command personnel’s mobile devices.

The Pastebin page linked to documents that appear to include names of high-raking US Army officials, the military division’s budget, and details of its weapons. Many of the files were already online, and a Pentagon spokesperson said that they were not top-secret papers.

John interviewed Richard Henderson, a security specialist with FortiGuard Labs, to get his perspective on the intrusion. Richard said that the attack was probably made possible by one of two scenarios, as has been common with recent social network hacks:

  1. Spear phishing, in which a specific organization or specific users are sent fraudulent emails as bait for them to supply passwords
  2. Malware that allowed attackers to access the accounts remotely.

If the documents posted by the terrorists were in fact confidential (which now appears doubtful), that may have been made possible by “a RAT-style malware attack which allowed exfiltration of documents,” which are typical of the Syrian Electronic Army.

John also recommended two tactics to keep the terrorists out of a government agency or other enterprise:

  1. Two-factor authentication
  2. Use of an independent computer specifically for logging into social networks

Obama Embarrassed at FTC

Clearly this incident was embarrassing for Obama, who was talking about cybersecurity at the FTC when the hack occurred. We shouldn’t allow the terrorists to steamroll the Obama message, though– because he was advocating data protection legislation.

The President argued for the Personal Data Notification and Protection Act, along with the Student Data Privacy Act, noting that over 100 million Americans have had their sensitive data stolen in big hacks of companies ranging from Sony (PlayStation) to Target to Home Depot. “When these cybercriminals start racking up charges on your card,” he said, “it can destroy your credit rating.” The first act would require companies to notify affected individuals within 30 days of a breach, while the second one would prevent schools from sharing student data beyond the educational sphere.


This ISIS attack, which fell just 49 days after the Sony one, provides further evidence that the US needs to put up stronger defenses against its enemies in North Korea, the Middle East, and elsewhere.

Like the federal government, security should be fundamental to our customers. That’s why all of our three world-class data centers are certified to meet SSAE 16.

By Kent Roberts

Public Domain image via Wikipedia

ISIS Hacks Central Command Twitter During Obama Speech

  • Security

ISIS Twitter Hack

Two US Central Command social media accounts – those for its YouTube and Twitter –were hacked on Monday, January 12. Claiming to represent the Islamic State, a.k.a. ISIS, the intruders made a bold and disconcerting threat, as covered by Kim Zetter of Wired.

We will look at the incident as follows:

  • What Did the Beheaders Post?
  • Pentagon Response & ISIS Background
  • Obama’s Legislative Security Agenda
  • Conclusion

What Did the Beheaders Post?

The terrorist group, famous for beheading Western journalists and humanitarian workers, targeted Central Command because it is the division of the Department of Defense responsible for the Middle East, North Africa, and Central Asia (a region that includes Iraq and Afghanistan).

After accessing the Twitter account, the cybercriminals tweeted as Central Command, in all capital letters (although I will spare you the SHOUTING): “American soldiers, we are coming, watch your back. ISIS.”

The tweet linked to fuller comments from the organization, since we are all eager to hear the life philosophy behind people who publicly decapitate objective and nonviolent citizens. The statement explained that in response to actions by the United States and its allies in Afghanistan, Iraq, and Syria, the Islamic State has infiltrated the networks and computers of the US military. It threatened violence toward nonbelievers. “ISIS is already here, we are in your PCs, in each military base,” it continued in a rambling diatribe, “with Allah’s permission we are in CENTCOM now.” The basic tone of the statement matched what the NSA might sound like if it were screaming, arrogant, and delusional.

Additionally, the hackers removed the Central Command seal in favor of a figure in a black and white keffiyeh, along with the handle CyberCaliphate and the boy-crazy message “i love you isis.” John Constine of TechCrunch reported that Cyber Caliphate is the name of the hacker group that may or may not actually represent ISIS.

The message accessed through the Twitter link, posted on Pastebin, contained links to various US Army files that it intends as evidence of a Pentagon hack. However, the documents aren’t really as top-secret as the intruders wanted them to appear. It’s believed that the files were either already publicly available or weren’t particularly sensitive.

Specifically, the files were a collection of images. Some of them showed spreadsheets that seem to contain home addresses for retired generals of the US Army. Others appeared to show military maps and strategies.

Pentagon Response & ISIS Background

The Pentagon said that the documents were real but that they were not top-secret. They didn’t even come from the Defense Department’s servers but apparently from those of MIT.

Although the document seemed to suggest that the attackers may have feigned an intrusion of the Pentagon, John is still not impressed: “Even if only the CENTCOM social accounts were compromised, it shows the sorry state of cybersecurity in the US government.” Plus, if the terrorists did indeed get into a confidential system, it’s evidence that the Islamic State is more equipped technologically then we had assumed.

Kim reports that Twitter deactivated the account 40 minutes following the initial tweet.

ISIS warned the social network in 2014 when it deactivated an account through which the militants were posting videos of American reporter and nonprofit personnel decapitations. Probably what happened with this hack is that the intruders breached the computer of the individual who maintains social networking for Central Command, thereby gathering the passwords from an individual rather than the government.

Obama’s Legislative Security Agenda

The hack was obviously intended to occur at a very specific time. It took place while Obama was speaking about cybersecurity at the FTC. His address was intended to promote new and improved data safeguards and faster notification when breaches occur. The President is urging Congress to pass the Personal Data Notification and Protection Act, which would make businesses responsible for alerting affected parties within 30 days if any of their sensitive data is compromised. In his speech, Obama mentioned the high-profile intrusions of Sony, Home Depot, and Target as key examples of the need for updated regulations. The bill would integrate the existing breach notification rules that vary from state to state. “Lawmakers have tried for nearly a decade to pass a federal bill to replace the patchwork of state laws, but have repeatedly failed,” explains Kim, “in part because either the laws didn’t go far enough or went too far.”

Obama also advocated for the Student Data Privacy Act, which would disallow schools to share student information beyond any legitimate academic needs. The FTC appearance is one stop on a week that the White House has dedicated to pushing certain bills from various agencies.


Even if we don’t agree with their perspectives, hackers demand our attention. One of the best ways that companies can protect themselves is by adhering to nationally recognized standards Choose Superb with confidence..

By Kent Roberts

Image labeled for re-use via The Mirror

Hack Marks Second Case of Real-World Physical Damage

  • Cloud
  • General
  • Security

Steel Mill Interior

Today we look at a hack on a German steel mill that produced the second confirmed case of cyberattack-originated physical damage:

  • Lost in the Sony Hoopla
  • Losing Control of the System
  • Separation to Enhance Security
  • Conclusion

Lost in the Sony Hoopla

The Sony hack captured our imaginations in December, so many people missed reports of an attack that was much more disturbing for those in the security field.

A report by the German government that was posted to the Internet in December details an attack on an unidentified German steel mill. The attackers created enough volatility within the plant’s control systems, wrote Kim Zetter of Wired, “that a blast furnace could not be properly shut down, resulting in ‘massive’—though unspecified—damage.”

This German incident is only the second time that a 100% digital assault has destroyed physical property. The original case of attackers crossing the virtual/physical divide was Stuxnet, a digital worm that was used by the United States and Israel to attack Iranian control systems. The infiltration occurred in late 2007 or early 2008. In January 2010, International Atomic Energy Agency inspectors observed that the  centrifuges for uranium gas enrichment were malfunctioning at an alarming rate. In June of that same year, a Belarus-based computer security company was contracted to determine why a number of PCs kept crashing and restarting. Eventually, the security firm located several malicious files, which together made up Stuxnet.

Since the 2010 incident, security specialists have agreed that more physical attacks are on the way. Zetter notes that the vulnerability is far-reaching: “Industrial control systems have been found to be rife with vulnerabilities, though they manage critical systems in the electric grid, in water treatment plants and chemical facilities and even in hospitals and financial networks.” A powerful invasion of those types of systems could have widespread and horrific consequences.

Losing Control of the System

The date of the cyberattack is not specified in the document, which was released by the Federal Office for Information Security (BSI). It mentions that the intruders accomplished the breach through the facility’s business network. From that launchpad, they were able to gradually get into the production equipment they wanted to manipulate.

The hackers gained access with spear-phishing. That technique sends fraudulent emails, intended to look as if they are coming from a credible source, to a specific organization. Using this email spoofing strategy, attackers convince recipients to open an attachment containing malware or go to a website that downloads the malicious software.

At the German steel mill, after the hackers made their way inside the business network, they were able to wreak havoc on various virtual environments, along with industrial mechanisms that they accessed through the production network.

The document indicates that disruption occurred both at the component level and at the systemic level. Failures occurred in rapid succession, making it impossible to turn off a blast furnace.

The report suggests that the people responsible for the breach seemed to possess granular knowledge of industrial control environments: “The know-how of the attacker was very pronounced not only in conventional IT security but extended to detailed knowledge of applied industrial controls and production processes.”

Separation to Enhance Security

The German government document does not list the name of the steel mill, the date of the initial intrusion, or the time span during which attackers had access to the networks. The BSI also doesn’t state whether the attackers directly intended the physical damage or if that occurred accidentally through their efforts to generally jeopardize the production process.

Although this steel mill hack remains somewhat ambiguous and a matter of government secrecy, it provides a real example of what security insiders have been concerned could happen following Stuxnet: sloppier invasions and, hence, more destructive outcomes (realizing that while a sophisticated digital weapon such as Stuxnet can prevent collateral damage, many hackers could cause more harm than intended).

The assessment by the BSI also demonstrates how crucial it is for businesses to establish “strict separation between business and production networks to keep hackers from leaping from one network to another and remotely accessing critical systems over the internet.”  While CIOs know that networks can only be air-gapped if they are disconnected from the Web and are not integrated with any environments that are connected to the Web, many firms only have a software firewall in between their business and production networks.

Software firewalls are far from flawless, though. They can contain configuration weaknesses or security vulnerabilities that allow attackers to pass through.

The report did not give any details related to configuration.


It seems that everything in tech is a careful balance of speed and care. Find your balance with Superb Internet: get lightning-fast cloud served from our three SSAE-16 certified data centers.

By Kent Roberts

Free Use image via Wikipedia from Flickr user paytonc

More Destructive 2014 Hacks: Snapsaved Had it Coming

  • Cloud
  • General
  • Security


Today we look at more of the biggest enterprise intrusions of 2014, as showcased by Kim Zetter for Wired (see our opening article here):

  • Home Depot – And You Thought Target Was Bad
  • Jennifer Lawrence Naked – Don’t Look, You Creeps
  • Snapsaved – They Had It Coming
  • Twitter – Never Going to Let You Down
  • Bitcoin – Um, Maybe this Wasn’t a Good Idea
  • I’m Afraid!

Home Depot – And You Thought Target Was Bad

Home Depot now feels the pain of Neiman Marcus, Michael’s, and Target. The hardware box store chain revealed in September that it had been hacked, compromising the payment card numbers of 56 million people – 10 million more than were stolen from Target. Kim notes that the intruders were inside the corporation’s network starting in April, after two previous attempts that resulted in minor damages. Independent security professionals had allegedly recommended that Home Depot install additional data safeguards that could have prevented the breach, but the company had not acted in time.

Jennifer Lawrence Naked – Don’t Look, You Creeps

Hackers ran roughshod on Jennifer Lawrence’s genitals in September, posting pictures of them for everyone to see. 4chan users released more than 500 images supposedly sourced from 100 iCloud accounts of media stars, in what some are calling “The Fappening.” Naked photos of Kate Upton, Kirsten Dunst, and others were included in the collection. According to Kim, analysts believe that the invasion of the Apple system resulted from a weakness “that failed to limit the number of times someone can attempt to open an account with a password, making it possible for someone to brute-force their way in with repeated password guesses.”

Tim Cook, CEO of Apple, said that its systems had not been hit with brute-force. Instead, one of two things happened: Either the hackers were able to answer the stars’ password-reset security questions, or the celebrities were targeted with phishing emails.

Apple also responded with two new features:

  1. Two-factor authentication
  2. Email notification when anyone attempts login from a new IP.

Snapsaved – They Had It Coming

Let me get this straight: They come out with an application that allows you to send messages that disappear after just a few seconds of viewing. You think to yourself, “You know what I should do? I should start saving this data from all these users who clearly don’t want the data to be saved, because that’s how messed up my head is! I demand an application to save these things!”

If you are one of these strange creatures, then you may have just been exposed in a release of 13 GB of information from Snapchat accounts, a total of almost 100,000 videos and photos.The images were posted through file-sharing system Pirate Bay by a 4chan user. The media was stolen out of Snapsaved, a service that panders to the Snapchat weirdos who wanted to save all the temporary files these people were sending them.

Twitter – Never Going to Let You Down

Have you ever wanted to write on Twitter, “I just farted,” and then compel the NPR Twitter handle to immediately retweet it? Well, sadly, and incomprehensibly, various people recently had that power and did not use it to do that.

An Austrian teenager found a bug in TweetDeck, a separate and widely-used Twitter software that helps tweet-hounds manage their newsfeeds. Many people responded by taking advantage of the opportunity to be a puppetmaster, turning the BBC and other Twitter users into their sock puppets. The teen discovered that he could send JavaScript in a tweet that would create pop-up alerts seen by other users or allow re-tweeting of messages through their accounts. People who exploited the vulnerability were mostly fooling around, writing retweet messages such as “Yo!” and the straightforward rickroll, “Never going to give you up, never going to let you down.” The teen figured out the vulnerability when he attempted to tweet a symbol of a heart. When his joyride was over, 30,000 accounts had retweeted his heart message, changing the world from a place of darkness and misery to a wonderland of ebullience and togetherness.

Bitcoin – Um, Maybe this Wasn’t a Good Idea

Bitcoin and similar projects in some ways seem like a great idea. For those who want to get away from currencies that they believe are being manipulated, it offers an alternative to the dollar or the pound or even commodities such as gold or corn – the latter of which have also proven wildly unstable in recent years .

However, Bitcoin has not been a peaceful environment. Silk Road 2.0, which sold drugs online in a similar manner to the first rendition that was subsequently shut down, was infiltrated and had all of its money removed, approximately $2.6 million worth of Bitcoins.

Three Bitcoin organizations were struck as well: Flexcoin, Poloniex, and CoinEx.

I’m Afraid!

The world can be a scary place, so you want a cloud provider that goes beyond “due diligence” and gets objective verification of its mechanisms. Our three data centers are as SSAE 16 audited, so you can choose our cloud with confidence.

By Kent Roberts

The Most Destructive Hacks of 2014

  • Cloud
  • General
  • Security

Biggest Hacks of 2014

Today we look at the biggest enterprise intrusions of 2014:

  • Introduction – Hackers Rampaging
  • Sony – Head Hanging in Shame
  • European Union – Government Spy Machine Regin
  • More

Introduction – Hackers Rampaging

Human beings are funny. Although we all want peace and security, we also gravitate toward death and destruction. Sometimes it is because we feel compassion for the victims. Sometimes we are trying to learn from bad examples and figure out what organizations seem vulnerable. And sometimes, we are mesmerized by the raw carnage. Perhaps all three of those explain our obsession with computer hacks.

Hacks aren’t just captivating, though. As Kim Zetter reports in Wired, data breaches at enterprises are progressively growing and becoming more sophisticated.

They are also becoming more sinister. When hackers infiltrated Sony Pictures, they did more than abscond with sensitive personal data. They performed a sort of digital terrorism on the inside of the studio’s network on their way out the door, deleting the contents of servers and leaving the IT team clamoring to recover.

Kim explains that this data-destruction type of attack is not new: “Digital destruction of this sort was first seen in Saudi Arabia and Iran when computers used in the oil industries were struck in 2012 with data-and system-destroying malware.” The Sony breach was actually a completely different and more ominous animal. In that scenario, data was handed over to the public, resulting in financial losses to the company – such as the need to repair the system. Sony’s stock has taken a hit.

Many in the security world are concerned that the nature of the Sony hack could be an omen of a developing slash-and-burn security environment. Come what may, we all know that there will be many data breaches in 2015 as well.

Here are Kim’s five most terrible hacks that occurred last year:

Sony – Head Hanging in Shame

On the Monday before Thanksgiving, the staff of Sony Pictures got to work, logged in to their computers, and were greeted with a graphically challenged red skeleton that looked like it was made by a 13-year-old who was really into death metal. The skeleton page warned that information would be released soon. The intrusion was so comprehensive that system engineers had to temporarily knock everyone out of the various systems, including email, VPN, and Wi-Fi.

The first public notice that the hack had taken place occurred when an ex-employee posted a screenshot of the skeleton on Reddit. The splash page credited the attack to an organization that calls itself the Guardians of Peace and that many believe to be a front for the North Korean government – which South Korea has reported to have 6000 cyber-soldiers and the capacity to wage nuclear war on the US.

The GoP then posted huge datafiles on the Internet, containing more than 40 GB of private personal and business data, including:

  • HIPAA protected health records
  • employee assessments and earnings
  • movie star paychecks and Social Security numbers
  • Various complete movies that have not yet been officially released.

Unfortunately for the studio, this may just be the beginning “since the hackers claim to have stolen more than 100 terabytes of data, including entire databases and email spools, but have so far released only a small fraction of this.”

You may know that Sony has been a bit of a punching bag for hackers over the years. In 2011, the hacktivists of Anonymous and LulzSec invaded four different Sony subsidiaries – BMG, Pictures, Online Entertainment, and the PlayStation Network. The latter two hacks resulted in the exposure of the personal information of 100 million people (three-quarters of them via PlayStation, the reason it got so much press).

European Union – Government Spy Machine Regin

Regin improves, just from a sheer power perspective, on the intrusive capabilities of Stuxnet and Flame. Regin is a government espionage application that successfully breached three organizations in 2011 and 2013 – a Belgian telecommunications provider, a Belgian cryptography firm, and the European Union – without being detected until last year.

Regin is not only useful for spying. It can take over complete networks instead of individual servers. Designed to be invisible to users over a long span of time, the tool is believed to have been developed by the United Kingdom intelligence bureau GCHQ, possibly in conjunction with the National Security Administration (NSA, a benevolent and mild-mannered organization that feeds homeless families and worries about its retirement pension). Kim explains why this thing is not okay: “Its most disturbing feature is a component designed to target GSM base stations in a way that could give the attackers control over a telecom’s entire mobile network.”


Well, there was no shortage of hack attacks in 2014, so we will look at five more incidents in a subsequent piece. In the meantime, check out our fully audited and certified solutions.

By Kent Roberts

Cloud Experts Say the Darndest Things About 2015

  • Cloud
  • General

Hitting the Target

This report looks at where cloud is headed for 2015, through the eyes of several experts in the field:

  • Introduction
  • John Engates – People won’t just buy on cost.
  • Allan Leinwand – Development agility will grow increasingly important.
  • Nigel Beighton – Infrastructure is on its way out.
  • Sachin Sony – Enterprises will build private, leading toward hybrid.
  • Conclusion


Cloud grew astronomically during 2014. The infrastructure as a service field became increasingly competitive at the top, as IBM and Microsoft took turns throwing punches at AWS, primarily by injecting huge sums of cash into breakneck efforts to topple the obvious market leader.

What happens in 2015? James Bourne collected perspectives from several industry experts.

Notably, these experts are to a large extent voice boxes for the strategies of their corporations. Don’t necessarily expect evenhanded attitudes or even clarity here. With that sizable grain of salt (maybe even a saltshaker), let’s look at these expert projections:

John Engates – People won’t just buy on cost.

John Engates, the chief technology officer of Rackspace, said the customers will be seeking out more sophisticated plans in 2015, rather than simply making buying decisions on cost. He commented, “The importance of a trusted partner will grow stronger, whether you rely on that partner to manage your public or private cloud, automate your DevOps or keep tabs on your apps.”

Firms will consider whether or not they want to hire people to manage technology in-house or use a third-party provider. They will look at the cost of IT management as a capital expense versus treating it as an operating expense through a hosting company.

It should come as no surprise that the “it’s not all about cost” spiel is not an objective opinion but represents a major publicity effort and business strategy at Rackspace.

Here’s how that all played out: Google dropped its prices for cloud on March 25 – with its storage plans and data analysis packages cut 68% and 85%, respectively. Amazon responded by dropping some of its own prices on March 26. A week later, Microsoft slashed prices as well. Neither Amazon nor Microsoft went quite as bargain-basement as Google, though. Rackspace subsequently announced that it would not be joining in the price war.

No matter how the company wants to frame it, James Sanders of TechRepublic explained that the contest between mega-companies to become the Walmart of cloud “is one that [Rackspace] simply cannot afford to join — razor-thin profit margins will not work for smaller organizations like Rackspace.”

Allan Leinwand – Development agility will grow increasingly important.

Allan Leinwand, the chief technology officer of cloud at ServiceNow, believes that platforms serve a vital collaborative function for businesses, allowing them to turn concepts into applications by integrating their perspectives and actual code in real time. He argued that by using a cloud platform, you can more quickly develop projects and test them. If tests don’t work out and an idea doesn’t end up making sense in application form, the amount of money at stake is reduced. He suggested that we “think of the cloud platform as enabling the ‘series A’ investor within the enterprise.”

Sure, platforms can work in that way, but Leinwand seems to me describing cloud in general. Developers don’t necessarily need vendor-specific platforms in order to succeed quickly at collaborative developmental projects.

Nonetheless, the explosive growth of PaaS is difficult to ignore.

Nigel Beighton – Infrastructure is on its way out.

Nigel Beighton, who is the vice president of technology for Rackspace, suggests that IaaS will be left in the dust as platforms, Web-based software (SaaS), containers, and continuous deployment become more prevalent. “IaaS has spelled its own irrelevance in the mind of the buyer by its API, and the abstractions on top of that which bring value to the user,” he said.

That is what we call “wishful thinking,” which seems to be the general angle of Rackspace these days in their public commentary. Gartner forecast in 2013 that cloud infrastructure would grow at a 41.3% CAGR through 2016, faster than platform or software. Saying that infrastructure is on its way out is like a guy at the bus station telling you that the cell phone market is getting ready to tank.

Sachin Sony – Enterprises will build private, leading toward hybrid.

Finally, Sachin Sony, who manages marketing for Equinix, said something that was at least not a thinly veiled sales pitch. Sony said that he thinks public and private clouds will become more common in organizations – setting the stage for hybrid. These clouds will also be more expansive: “Major cloud providers have become more aggressive in deploying their services, and enterprise CIOs have largely moved beyond simply deploying selected applications in the cloud.”


We will see how 2015 develops, but the industry won’t mold itself to fit the desires of the Rackspace business plan.

Everyone wants straight talk. That’s exactly what we provide to our cloud customers, through our incredible support staff.

By Kent Roberts