Internet 1.0 servers and endpoints were static. Internet 2.0 servers were static and endpoints were mobile. In the Internet 3.0 world, servers utilizing cloud, containers and "server-less" apps and endpoints (mobile devices, tablets, IoT, etc.) are highly mobile. The traditional perimeter-based security architecture used in various sectors (.edu, .gov, .com, .org, etc.) has basically failed to protect internal assets. New technologies such as IoT and mobile devices will force a new approach to network security architecture. Zero-trust networks (ZTNs) assume that the network is hostile, attackers are already inside the net, and segmentation is not sufficient for determining trust among other characteristics.
Takeaways:
Presented by:
Randy Marchany, CISO, Virginia Tech University