People Get Ready!: Mapping Zero Trust Principles to Zero Day Realities

Two of the most relevant, if trendy, topics in cybersecurity today relate to the starting point — the “ground zero” of attacks — from both the attacker’s and the defender’s perspective. The most useful weapons in the attacker’s arsenal are Zero Day attacks; that is, previously unknown or unseen attacks. Such attacks are especially pernicious because there is no bespoke, pre-existing defender countermeasure. There is no snort signature, no specifically predefined pattern of behavior to look for, no TCP port to lock down. In that…

Looking Back

I like watching bad movies. I can’t help it really; I was born this way. Sometimes I’ll be sitting around with my older brothers, and we’ll talk about ridiculous movies, nonsensical movies, movies that are so stupid that they defy logic…and yet…they’re hilarious. “Did you see Tremors?” someone will ask. “Five times… at least!” is the reply. “OMG… really? Me too!” So you can see it’s a genetics issue. Nonetheless, no matter how bad the movie, there’s usually one or two redeeming moments. Maybe a…

Your Firewall is Now Everywhere — And Nowhere

Network security has been stuck in a box for too long. Much of what we know consists of perimeter or zone-based rules that limit which network segments can talk to which other network segments over which ports. The workhorse of this world has been the firewall appliance, interconnecting network segments and enforcing these rules. In the meantime, applications have moved to the public cloud and users have left the building. Hybrid work is challenging the very notion of the enterprise WAN. So what does this…

Discover your Cloud Security Posture Maturity Level

ONUG Cloud Native Security Working Group Blog Series Introduction Cloud Security Posture Management (CSPM) is currently one of the fastest growing areas within the field of cloud security; most security vendors are now offering or developing CSPM capabilities. However, enterprises are still trying to build the most effective CSPM program to fit their environment. In many cases, it’s unclear where to start and what the end goal is for the CSPM effort.  To help simplify this process, this post will share guiding principles for implementing…

Evolving Data Center Networks from Cloud-Ready to Cloud-Native

A 2020 survey found that at least half of data center workloads will remain in enterprise data centers until at least 2022. Businesses are hesitant to move more mission-critical operations to the cloud until there is more openness, transparency, and accountability. The following participants in the Evolving Data Center Networks session of ONUG Fall 2020 would agree: Christopher Liljenstolpe, Chief Architect, Cloud at Cisco Parantap Lahiri, VP, Network and Datacenter Engineering at ebay Charles Greenaway, Customer CTO at BT Global Carlos Matos, Executive Director, Cybersecurity…