Blog

The True Cost of Legacy Technology: How Technical Debt Stymies Enterprise Security and Network Transformation

The first network message was sent over ARPANET in 1969. A few years later Vint Cerf and Bob Kahn introduced the Internet Protocol (IP)—the foundation for modern network communication. In 1983, NetBIOS was created as part of Windows internet naming services (WINS). In that same year the Domain Name Services (DNS) naming system was created, supplanting WINS. Why the…

The CIO Mandate for Secure Cloud Transformation

Join me and Nathan from Zscaler in this webinar The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that…

Three Ways ZTNA Protects Against Ransomware in 2020…and Beyond

https://info.zscaler.com/webinar-three-ways-ztna-protects-against-ransomware Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is frustrating for IT teams that are being asked to enable mobility for their users. Unfortunately, the technology they invested in to protect their business has been rendered obsolete. We understand. We’ve helped hundreds of…

Computer World Keynote BlackCloud

I will be the keynote speaker at this years Computer World Security Conference in Denmark, both Copenhagen and Aarhus, come along and find out how BlackCloud can protect the enterprise. January 28th in Aarhus at Radisson Blu Scandinavia Hotel Margrethepladsen 1 8000 Århus C January 30th in Copenhagen Clarion Hotel Copenhagen Airport Ellehammervej 20 2770…

25 seconds in Fiji

Moments after hearing the coffee machine click and the expresso starting to pour, I looked up to see the coffee pouring into the cup, expecting to see two beautiful thin curved golden brown coffee flows into the cup, but I couldn’t see any coffee! I thought to myself was that a 5 second shot? Was…

ComputerWorld Interview

Check out the computer world article https://www.computerworld.dk/art/248956/saadan-beskytter-man-energy-solutions-sig-effektivt-mod-hackere-alle-data-holdes-i-total-moerke-i-en-black-cloudcompany. Below you will find some quotes from my side Earlier, security was built around the idea of building a perimeter around the . Like a defensive wall. This is how we used to think security. With a firewall on the outside and then set up some rules for what…

theCUBE Interview with Peter Burris

I spoke spoke with Peter Burris (@plburris), host of theCUBE, SiliconANGLE Media’s livestreaming studio, at theCUBE’s studio in Palo Alto, California. We discussed how Zscaler Inc. transformed MAN’s infrastructure into a dark space, as well as the security benefits of application-centric access controls. https://youtu.be/Kw8XSuO91h4

BlackCloud, The Internet is going dark – CIO Europe Article

https://cloud-banking.bankingciooutlook.com/cxo-insights/black-cloud-the-internet-is-going-dark-nwid-960.html The idea of making the internet or corporate network dark has gained momentum since the introduction of Software Defined Networking (SDN). This has enabled a new concept called Software Defined Perimeter (SDP) or what some are referring to as BlackCloud. This concept has the effect of making application’s invisible (dark) and only accessible by…

Secure Cloud Transformation – The Book

I am honored to be one of the Contributors to this great book. A real-world narrative for building the future in a cloud-first world Secure Cloud Transformation tells the stories of how forward-thinking enterprises achieve scalable growth with direct, secure connectivity. The cloud has transformed how we work: We connect to resources from any device,…

Loading…

Something went wrong. Please refresh the page and/or try again.


Follow My Blog

Get new content delivered directly to your inbox.

%d bloggers like this: