Skip to content
ON2IT
  • Zero Trust
  • Managed Security
  • John Kindervag
  • Resources
    • John Kindervag
    • All resources
      • Guides & Papers
      • Data sheets
    • Blog
  • Login
  • NL

Yuri Bobbert

Lessons learned from over sixty years of combined Zero Trust implementation

June 30, 2022April 20, 2022

Biden’s Zero Trust advice, as well as the Dutch NCSC advice, has put Zero Trust on the map more than it has ever been before. But what exactly is Zero Trust? And how has it developed since John Kindervag popularized the term?

Read more

Authors

John Kindervag

John Kindervag
Senior VP Cybersecurity

Yuri Bobbert
Global CISO

Lieuwe Jan Koning
CTO

Rob Maas
Lead Architect

Johan Bogema
Product Owner Cloud Security

ON2IT

Contact
About us
Press releases
Media coverage

Prevention

Zero Trust as a Service
AUXO™
mSOC™

Resources

John Kindervag
Guides & Papers
Datasheets
Video
Blog

Managed Cyber Security

Controls Management
Protect Surface Management
Event Management
Incident Management
Improvement Management
Compliance Management

Social media

LinkedIn Twitter YouTube
Copyright © ON2IT · Privacy & Cookie policy · Responsible disclosure
Schedule a talk with John Kindervag

Interested in a live interactive Q&A with John, scheduled for a limited group? Please fill in the form below. We’ll make sure to send you the details by email.

 

Join our cybersecurity newsletter

Stay up to date on the latest cybersecurity news and trends.

The John Kindervag Newsletter

Stay up to date on John’s articles, papers and appearances.

Zero Trust Dictionary

Download the Zero Trust Dictionary by Zero Trust creator John Kindervag.

We will treat all your data confidentially (see our privacy statement).
This field is for validation purposes and should be left unchanged.
Authentic Zero Trust Guide

Download the Authentic Zero Trust Guide by Zero Trust founder John Kindervag.

We will treat all your data confidentially (see our privacy statement).
This field is for validation purposes and should be left unchanged.
How a Zero Trust strategy prevents data breaches using unknown threats

In light of the Log4j vulnerability, the question “how do we protect our organization from unknown threats” is increasingly being asked.

Do you engage in the race with hackers? How do you deal with the by definition unknown attack surface that is growing daily? In this article, we explain how a Zero Trust strategy can provide a solution.

We will treat all your data confidentially (see our privacy statement).
This field is for validation purposes and should be left unchanged.
A hands-on approach to Zero Trust implementations
We will treat all your data confidentially (see our privacy statement).
Request your AUXO demo

Experience how AUXO provides real insight into the cybersecurity health of your organization.

Name(Required)
Request your Zero Trust as a Service demo

Experience how Zero Trust as a Service care of the security process so you can focus on what is really important: managing your business and realizing growth.

Name(Required)
Request a Zero Trust Readiness Assessment
Name(Required)