Author

Rob Maas

Rob Maas is Field CTO at ON2IT and a leading Zero Trust Consultant. He has years of practical experience implementing Zero Trust and is known for his passion for IT, Cybersecurity and mountainbiking.

Rob is extremely curious and encourages the same curiosity in others by explaining complex cybersecurity matters in a way that makes them accessible and understandable for everyone.

LinkedIn

Blogs By Rob Maas

Two puzzle pieces demonstrate integration of VPN and firewalls.
Integrating various network functions within a single device, such as combining VPN (Virtual Private Network) capabilities with firewalls, has become a common practice over the past few years. This consolidation offers benefits in terms of platform security features (i.e. user-based policies and Layer 7 inspection), simplicity and cost-effectiveness.
Though Zero Trust is here to stay, that doesn’t mean implementation is easy. Rob Maas is one of the leading Zero Trust consultants and the Field CTO at ON2IT. In this blog series, he’ll provide background and tips based on his years of practical experience implementing Zero Trust.
When your IT-department is confronted with a serious threat such as Log4j, you should be able to focus on problems that precede the question of whether you should and can patch or not.
Although Log4j and follow-up attack vectors are still a real threat for many organizations, it’s certainly not too early to draw lessons learned from this episode. What made Log4j different from other ‘classic’ 2021 vulnerabilities such as Citrix, Kaseya, and Hafnium (Exchange) is the fact that it was much harder for organizations to pinpoint if they were vulnerable.