ComputerWorld Interview

Check out the computer world article https://www.computerworld.dk/art/248956/saadan-beskytter-man-energy-solutions-sig-effektivt-mod-hackere-alle-data-holdes-i-total-moerke-i-en-black-cloudcompany.

Below you will find some quotes from my side

Earlier, security was built around the idea of building a perimeter around the . Like a defensive wall. This is how we used to think security. With a firewall on the outside and then set up some rules for what traffic can move in and out of the business. ”

 

“It has worked fine for about 20 years, but now we see more people moving their data in the cloud, and we see attacks like Wannacry and Notpetya worms attacking laterally. “

 

“That is why we would like to move towards a zero trust model. It means that we set rules for each unit instead. That way, we make sure that this device can only speak to these applications. Instead of placing your firewall somewhere, you should think of your entire network as one big firewall. ”

 

“Black cloud is very different, understood in the way that you do not establish a network connection. So instead of connecting everything to each other, so everyone can talk to everyone, you instead ask who you are, and when I know that, I can decide what to give permission to. “

 

“In the past, the idea was that everyone could get connected to the network. Then you have to confirm who you are through a username and password. Black cloud turns that thinking on its head by asking who the device is before it is possible to connect to the network. Only once I know who you are can I manage what you get access to. By doing so, I simultaneously keep the hackers in the dark. You have to think of it as a technology you are on top of the network, so it’s all encrypted and you’re on top of it, which means the whole network is controlled by software. “

 

“The first thing the software does is identify you in the same way as a VPN. Then, when you are connected, you can request access to applications in the cloud and then you will be connected to what you need without being connected to a network at any time. “

 

“Users can still access my AWS cloud, but when the hackers scan the Internet, he doesn’t see my open ports. It creates a closed environment, the only way you can get in is through these connecting devices. “

“Earlier, security was built around the idea of building a perimeter around the company. Like a defensive wall. This is how we used to think security. With a firewall on the outside and then set up some rules for what traffic can move in and out of the business. ”

 

“It has worked fine for about 20 years, but now we see more people moving their data in the cloud, and we see attacks like Wannacry and Notpetya worms attacking laterally. “

 

“That is why we would like to move towards a zero trust model. It means that we set rules for each unit instead. That way, we make sure that this device can only speak to these applications. Instead of placing your firewall somewhere, you should think of your entire network as one big firewall. ”

 

“Black cloud is very different, understood in the way that you do not establish a network connection. So instead of connecting everything to each other, so everyone can talk to everyone, you instead ask who you are, and when I know that, I can decide what to give permission to. “

 

“In the past, the idea was that everyone could get connected to the network. Then you have to confirm who you are through a username and password. Black cloud turns that thinking on its head by asking who the device is before it is possible to connect to the network. Only once I know who you are can I manage what you get access to. By doing so, I simultaneously keep the hackers in the dark. You have to think of it as a technology you are on top of the network, so it’s all encrypted and you’re on top of it, which means the whole network is controlled by software. “

 

“The first thing the software does is identify you in the same way as a VPN. Then, when you are connected, you can request access to applications in the cloud and then you will be connected to what you need without being connected to a network at any time. “

 

“Users can still access my AWS cloud, but when the hackers scan the Internet, he doesn’t see my open ports. It creates a closed environment, the only way you can get in is through these connecting devices. “

 

“Previously, we had a large network for the entire company, where you get connected to the data center. What I do is say; all my users are on the internet. I don’t care if you’re in the office or at home. “

 

“I don’t trust you no matter how you are connected to the internet. I call it the coffee shop method because I treat all users as if they were sitting at the local coffee shop. By doing so, I make sure that if you access the corporate network, then all devices are dark and my data center is completely closed and the only way in is to save the black cloud. “

 

“The main purpose is to reduce the level of attack. Of course we have open entrances, but the goal is of course to close it as much as possible. It’s hard to hack something you can’t see. Because if you can’t see it, how can you hack it? “

%d bloggers like this: