John Burke

John Burke, CTO of Nemertes, advises clients based on primary research in cloud, networks, automation, and security, and on his 30-plus years’ experience as an IT researcher, practitioner, and leader.

Rethinking the WAN: Zero Trust network access can play a bigger role

Software-defined perimeter is a good place to start a rollout of Zero Trust network access

Software-defined perimeter is a good place to start a rollout of Zero Trust network access

Software-defined perimeter can be an important part of Zero Trust that enforces network access, but first plan the Zero Trust architecture and the changes that means for the network and security.

Cloud Security – Follow the Feds?

Last week the Feds had a coming out party for FedRAMP (Federal Risk and Authorization Management Program).  Originally announced in October, FedRAMP sets standards for privacy and security for cloud providers to meet in support of...

The Swiss Cheese Perimeter Defense

Since the beginning of the information security profession, the predominant model for security has been a location-centric model. The foundational control is physical access over a computer or computer facility itself. On top of...

Blog: Securing "the" directory

I use the quotation marks around “the” with respect to enterprise directory because there is almost never a single directory in the enterprise. Fifteen years after the first time I remember discussing consolidating onto a single...

Directory Direct

@font-face { font-family: "MS 明朝"; }@font-face { font-family: "Cambria Math"; }@font-face { font-family: "Cambria"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: Cambria;...

Phone-as-token: availability/security

@font-face { font-family: "MS 明朝"; }@font-face { font-family: "Cambria Math"; }@font-face { font-family: "Cambria"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: Cambria;...

Mobilizing Multifactor

One of the most interesting developments in multifactor authentication is the rise of ubiquitous mobile access.  Ten years ago, most knowledge workers did not carry a mobile phone at all, or even a pager, let alone a smart phone with...

The Need for Cloud Identity Management

Imagine this scenario: a disgruntled IT staffer leaves the company, goes down to the local McDonald's, logs back into the network and starts taking down virtual machines. One of the machines taken down is the Exchange server,...

Mobile Voice and Data Availability: it’s an internet security issue

The other day I was at my friend’s house in Washington, Virginia, (just beyond the middle of nowhere) where mobile phone service is nonexistent. Up until recently the only way to use my Verizon mobile at his house was to use WiFi for...

The Pros and Cons of a Cloud-Based Firewall

For the past few posts I’ve been writing about cloud-based security adoption while focusing on cloud-based firewall as a service, which enjoys high interest among enterprise security architects and staff. There are definitely...

The DNS Under Your Hood

The other day I was reading an article about Ford’s efforts in conjunction with MIT to embed wireless applications into cars. It’s really exciting stuff. A scenario described is one car communicating with cars further up the road to...

Load More