One of the biggest challenges within cybersecurity is how to handle the sheer amount of data. Everyone in the field is familiar with the stories of failed SIEM implementations, because the number of false positives is simply too big for the available IT staff to have enough time and manpower to separate the useful from the useless.
Recently, NIST published the Special Publication (NIST SP) for Zero Trust. ON2IT has been implementing Zero Trust based Cybersecurity strategies for over ten years, pushing forward the work of founding father John Kindervag.
The DMZ (Demilitarized zone) model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was the same.
The terms network segmentation and Zero Trust are used more and more, and have become proper buzzwords. We also see an increase in the number of requests ‘to segment the network’. What is actually meant, is if we can help setting up a Zero Trust environment.