Author

Rob Maas

Rob Maas is Field CTO at ON2IT and a leading Zero Trust Consultant. He has years of practical experience implementing Zero Trust and is known for his passion for IT, Cybersecurity and mountainbiking.

Rob is extremely curious and encourages the same curiosity in others by explaining complex cybersecurity matters in a way that makes them accessible and understandable for everyone.

LinkedIn

Blogs By Rob Maas

Although Log4j and follow-up attack vectors are still a real threat for many organizations, it’s certainly not too early to draw lessons learned from this episode. What made Log4j different from other ‘classic’ 2021 vulnerabilities such as Citrix, Kaseya, and Hafnium (Exchange) is the fact that it was much harder for organizations to pinpoint if they were vulnerable.
The DMZ model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was same.
network segmentation
The terms network segmentation and Zero Trust are used more and more and have turned into real buzzwords. We are asked more and more often whether or not we can segment the network. What is actually being asked is, can we help set up a Zero Trust environment.
context is key
Content vs Context Properly assessing this data isn’t a challenge that’s solved by throwing a set of general rules at it, which is what virtually all these products do. The complexity is in the relevance of the data in relation to your environment. It’s important to make the clear distinction between content and context here. … Read more