The DMZ (Demilitarized zone) model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was the same.
With the appointment of Prof. Dr. Yuri Bobbert as Global Chief Information Security Officer, cybersecurity company ON2IT has acquired a cybersecurity expert with extensive theoretical and practical experience.
ON2IT, the global pure-play cybersecurity service provider, today announced it received the Palo Alto Networks Global Managed Services Partner of the Year Award.
ON2IT Inc. today announced that it has teamed with Arrow Electronics' enterprise computing solutions business on a go-to-market managed security service program offering.
The terms network segmentation and Zero Trust are used more and more, and have become proper buzzwords. We also see an increase in the number of requests ‘to segment the network’. What is actually meant, is if we can help setting up a Zero Trust environment.
By combining the Polar Flow data with social media profiles and other public information, Dutch journalists, together with the Bellingcat network for citizen journalism, were able to find names, addresses and photos of no less than 6460 individuals.