APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cryptocurrency
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    Digital Tack

    Claus Nehmzow, Chief Innovation Officer, Eastern Pacific Shipping Pte

    How Cloud Migration Fueled Digital Transformation And Global Growth For ACI Specialty Benefits

    Ryan Fay, Global CIO, ACI Specialty Benefits

    The Advent of Crypto

    Grant Brett, CIO, Forex Club

    How Blockchain Creates Waves in the Tech World

    Odile PANCIATICI, VP Blockchain Groupe Renault

    Fishing for the Future - How One of the World's Oldest Industries is Embracing Technology for Sustainability

    Dr. Darian Mcbain, Global Director of Sustainable Development, Thai Union

    Blockchain in the Enterprise

    Agnelo Marques, VP Technology & Head Blockchain COE, Mphasis

    Blockchain Enters Innovation Agendas

    Tamanna Dahiya, Director, Asia Pacific Innocation Center, DHL

    How Blockchain can be an Enabler for Digital Identity Verification

    Cindy Nicholson, Director-Strategic Accounts Digital Innovation, Optus

    right

    Black Cloud, The Internet is Going Dark

    Tony Fergusson, IT Infrastructure Architect, Man Energy Solutions

    Tweet
    content-image

    Tony Fergusson, IT Infrastructure Architect, Man Energy Solutions

    The idea of making the internet or corporate network dark has gained momentum since the introduction of Software Defined Networking (SDN). This has enabled a new concept called Software Defined Perimeter (SDP) or what some are referring to as BlackCloud. This concept has the effect of making application’s invisible (dark) and only accessible by authorized devices and user’s. It creates an authorization network fabric where you can define what you trust and who is allowed to connect to each application, so think of this as a micro-segmented perimeter that is everywhere that fits nicely into the zero trust model. John Kindervag the founder of Zero Trust introduced me to this concept in 2011, the idea of making sure you have established trust between devices before allowing them to connect, now this idea has become reality. For more information on this, the Cloud Security Alliance (CSA) has some great resources.

    This new perimeter security model makes more sense in a world where the legacy corporate perimeter is disappearing,and application’s and users are no longer on the corporate network. Enterprises need to embrace this new paradigm to ensure they can secure the new world where users are mobile and applications are in the cloud.
    I believe the corporate network will transform into internet cafes where users are only granted internet access and application access to cloud application is using SDP. This incredible network transformation we are experiencing is talked about in this new book Secure Cloud Transformation by Richard Stiennon, where there are some great examples of companies already on this transformational journey.

    We have been building our networks for years with the moat and castle concept, firewalls protecting the internal network but this design is outdated and we need to design our networks inside out. This means we should not build large enterprise networks allowing east west traffic flows between what we believe are trusted devices. Clients should only communicate securely to applications on public and private clouds viaa north-south internet SDP Fabric. This architecture will reduce the attack surface and prevent worm propagating malware outbreaks like Wannacry and NotPetya.

    The cloud security company Zscaler has gone even one-step further with this concept of application access, application policy access is based on name space (DNS) not network addressing. This completely changes the way we create and manage policy, this ensures policy is application centric not network centric, you can even define per application authentication timeout which improves user experience and protects high value assets. Most importantly, they introduce multiple layers of mutual TLS encryption and trust that ensures no one can intercept and snoop on the data.

    By creating,a dynamic secure segment for each user to only specific applications enables a true zero trust model. This concept of creating your own BlackCloud (Darknet), where you can control and monitor application access will enable enterprises to create their own secure network fabric, regardless of the user´s or the application’s location.

    You Can’t Attack What You Can’t See

    In this day and age, enterprises must reduce the attack surface. We cannot continue to worry about the next SSL/ TLS vulnerability, and we need to make sure no parts of our ecosystems whether on premise or in the cloud are exposed, let alone seen to be vulnerable. This is especially important in a world in where malware propagating is taking down enterprises and hackers are keen to profit using ransomware, crypto-mining, supply-chain exploits, IoT botnets, and a range of other new and creative attacks they have been cooking up.
    tag

    IoT

    Weekly Brief

    loading
    Top 10 Cryptocurrency Solution Companies - 2020
    Top 10 Cryptocurrency Consulting/Services Companies – 2020
    ON THE DECK

    Cryptocurrency 2020

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cryptocurrency.apacciooutlook.com/cxoinsights/black-cloud-the-internet-is-going-dark-nwid-6385.html