
Sign up to save your podcasts
Or


Guest:
Martin Roesch, CEO at Netography, creator of Snort
Topics:
What is the role of network security in the public cloud? Networks used to be the perimeter, now we have an API and identity driven perimeter. Are networks still relevant as a layer of defense?
We often joke that "you don't need to get your firewalls with you to the cloud", is this really true? How do you do network access control if not with firewalls?
What about the NIDS? Does NIDS have a place in the cloud?
So we agree that some network security things drop off in the cloud, but are there new network security threats and challenges?
There's cloud architecture and then there's multi cloud and hybrid architectures–how does this story change if we open the aperture to network security for multi cloud and hybrid?
Should solutions that provide cloud network security be in the cloud themselves? Is this an obvious question?
Resources:
Book "Who: The A Method for Hiring" by Geoff Smart, Randy Street
Netography resources
Snort
""Hacking Google", Op Aurora and Insider Threat at Google" (ep91)
"Zero Trust: Fast Forward from 2010 to 2021" (ep8)
"Gathering Data for Zero Trust" (ep4)
By Anton Chuvakin4.8
3939 ratings
Guest:
Martin Roesch, CEO at Netography, creator of Snort
Topics:
What is the role of network security in the public cloud? Networks used to be the perimeter, now we have an API and identity driven perimeter. Are networks still relevant as a layer of defense?
We often joke that "you don't need to get your firewalls with you to the cloud", is this really true? How do you do network access control if not with firewalls?
What about the NIDS? Does NIDS have a place in the cloud?
So we agree that some network security things drop off in the cloud, but are there new network security threats and challenges?
There's cloud architecture and then there's multi cloud and hybrid architectures–how does this story change if we open the aperture to network security for multi cloud and hybrid?
Should solutions that provide cloud network security be in the cloud themselves? Is this an obvious question?
Resources:
Book "Who: The A Method for Hiring" by Geoff Smart, Randy Street
Netography resources
Snort
""Hacking Google", Op Aurora and Insider Threat at Google" (ep91)
"Zero Trust: Fast Forward from 2010 to 2021" (ep8)
"Gathering Data for Zero Trust" (ep4)

2,009 Listeners

372 Listeners

651 Listeners

1,020 Listeners

319 Listeners

416 Listeners

8,059 Listeners

179 Listeners

314 Listeners

189 Listeners

204 Listeners

74 Listeners

57 Listeners

139 Listeners

44 Listeners