John Kindervag, now Forrester’s best-known security consultant, is the only speaker to present a keynote at all four Bright & Cloudy events since 2013. When in Utrecht, four years ago, the outspoken Texan announced that the traditional way of network security – with its trusted internal network and unreliable
No or only limited control, but still responsible and having to deal with potential adverse consequences. You can't just trust the security measures of your SaaS supplier. So, what should you do?
The terms network segmentation and Zero Trust are used more and more and have turned into real buzzwords. We are asked more and more often whether or not we can segment the network. What is actually being asked is, can we help set up a Zero Trust environment.
The increasing popularity of Zero Trust means that more and more is written about it. Unfortunately, the many online publications show that there are quite a few misgivings - and that not everyone understands what exactly is the purpose of Zero Trust.
Recently, NIST published the Special Publication (NIST SP) for Zero Trust. ON2IT has been implementing Zero Trust based Cybersecurity strategies for over ten years, pushing forward the work of founding father John Kindervag.
The DMZ (Demilitarized zone) model can be found in the physical world, with the DMZ between North and South Korea being the most well-known. The idea of this DMZ is that it is neutral territory. Whenever there needs to be some sort of discussion impacting both parties, they meet in the DMZ. When network operators first started implementing the DMZ model, the idea was the same.