John Burke

John Burke, CTO of Nemertes, advises clients based on primary research in cloud, networks, automation, and security, and on his 30-plus years’ experience as an IT researcher, practitioner, and leader.

The case for declarative network automation

Zero trust requires network visibility

Zero trust requires network visibility

AI and machine-learning techniques are imperative in a zero-trust environment that depends on analysis of the behavior of every device, person, or system using the network.

Use zero trust to fight network technical debt

Use zero trust to fight network technical debt

Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.

Zero trust requires clear architecture plans before changing core systems

Zero trust requires clear architecture plans before changing core systems

Successful enterprises approach zero trust carefully, with the big picture in mind, before making changes to network access, data management or application engineering.

5G wireless WAN will have benefits beyond 4G WWAN

5G wireless WAN will have benefits beyond 4G WWAN

Cellular WAN connectivity has solid enterprise use cases with 4G, and as 5G rolls out, will become more attractive for its speed, reliability, and price.

How wireless WAN can make SD-WAN more agile and resilient

How wireless WAN can make SD-WAN more agile and resilient

WWANS can augment SD-WANs with failover, redundancy, and rapid set-up.

Rethinking the WAN: Zero Trust network access can play a bigger role

Rethinking the WAN: Zero Trust network access can play a bigger role

COVID-induced work-from-home prompted WAN innovations that demonstrate VPNs and SD-WAN aren’t the only good options.

Software-defined perimeter is a good place to start a rollout of Zero Trust network access

Software-defined perimeter is a good place to start a rollout of Zero Trust network access

Software-defined perimeter can be an important part of Zero Trust that enforces network access, but first plan the Zero Trust architecture and the changes that means for the network and security.

Cloud Security – Follow the Feds?

Last week the Feds had a coming out party for FedRAMP (Federal Risk and Authorization Management Program).  Originally announced in October, FedRAMP sets standards for privacy and security for cloud providers to meet in support of...

The Swiss Cheese Perimeter Defense

Since the beginning of the information security profession, the predominant model for security has been a location-centric model. The foundational control is physical access over a computer or computer facility itself. On top of...

Blog: Securing "the" directory

I use the quotation marks around “the” with respect to enterprise directory because there is almost never a single directory in the enterprise. Fifteen years after the first time I remember discussing consolidating onto a single...

Directory Direct

@font-face { font-family: "MS 明朝"; }@font-face { font-family: "Cambria Math"; }@font-face { font-family: "Cambria"; }p.MsoNormal, li.MsoNormal, div.MsoNormal { margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: Cambria;...

Load More