<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.viszensecurity.com/blogs/feed" rel="self" type="application/rss+xml"/><title>Viszen Security - Insights</title><description>Viszen Security - Insights</description><link>https://www.viszensecurity.com/blogs</link><lastBuildDate>Fri, 19 Dec 2025 10:12:13 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[NEW Zero Trust Guidance for OT/ICS]]></title><link>https://www.viszensecurity.com/blogs/post/new-zero-trust-guidance-for-ot-ics</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Tue Nov 05 2024.png"/>We co-authored a guide with CSA explaining how to operationalize zero trust in OT/ICS environments, including mapping to existing guidance and frameworks like ISA 62443.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_y63d7UHlQzm4TYmYrVfy6w" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_hCaIM6njTb6TiylAHrepQA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm__tdMnDUrSGqXCu6iPXgHgg" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_iW34TbF8RrmexJ9-nxEjAQ" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center " data-editor="true">Free resource from Cloud Security Alliance</h2></div>
<div data-element-id="elm_vtCfDzzGTna_SJlel8QRig" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"><span style="font-size:14px;">I'm proud to share the release of a guide we co-authored with the </span><a target="_self" href="https://www.linkedin.com/company/cloud-security-alliance/">Cloud Security Alliance</a><span style="font-size:14px;"> on applying zero trust to OT/ICS and critical infrastructure. <br><br> Zero Trust Guidance for Critical Infrastructure</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">Applying Zero Trust to Operational Technology (OT) and Industrial Control Systems (ICS) Environments<br> 🔗&nbsp;<a href="https://cloudsecurityalliance.org/artifacts/zero-trust-guidance-for-critical-infrastructure">https://cloudsecurityalliance.org/artifacts/zero-trust-guidance-for-critical-infrastructure</a></span><span style="font-size:14px;"><br><br> You can download this resource (free) from CSA.<br><br> This was definitely a labor of love by all involved. When CSA proposed this, I had one condition: I wanted to make it real and actionable—no fluff. No page after page of confusing abstract buzzwords. <br><br> This document provides engineers and architects with a clear, adaptable 5-step process for applying zero trust in OT, aligning IT skills with OT demands.</span></span></p><p><span style="color:inherit;"><span style="font-size:14px;"><br></span></span></p><p><span style="color:inherit;"><span style="font-size:14px;">Visit the link above at CSA's Zero Trust portal and create a free account to download the full document or it's accompanying (shorter) presentation deck.&nbsp;<br><br></span></span><span style="color:inherit;"><img src="https://www.viszensecurity.com/Tue%20Nov%2005%202024.png" alt="" style="width:240px !important;height:306px !important;max-width:100% !important;">&nbsp;</span></p><p><span style="color:inherit;"><img src="https://www.viszensecurity.com/Tue%20Nov%2005%202024-1.png" alt="" style="width:403.67px !important;height:226px !important;max-width:100% !important;"></span></p><p><span style="color:inherit;"><br></span></p><p><span style="color:inherit;">If you're a CISO or CIO responsible for security OT/ICS environments, you'll love this resource.&nbsp;<br><br></span></p><p><span style="color:inherit;">And, <span style="font-weight:bold;">if your organization is interested in learning more about integrating OT/ICS into your security program,</span><a href="/contact" title="contact us" rel="">contact us</a> for advisory services and/or corporate training for your team.&nbsp;<br><br></span></p></div>
</div><div data-element-id="elm_XEG32kaFSAWDU1GdO7b5Fw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 05 Nov 2024 10:56:58 -0500</pubDate></item><item><title><![CDATA[NEW Training and Certification Mini-Event]]></title><link>https://www.viszensecurity.com/blogs/post/new-training-and-certification-mini-event</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Promo class images.png"/>New training for Wi-Fi, network, and security engineers for Wi-Fi 6E, Wi-Fi 7, WPA3, and new security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pBb97HkdSKyr3T7d2oDwkg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uqyXACehRN-mj4XtMX_Kdg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8_FGqincTkCEwXDTdr8Smw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ix3HCB6VS3Ovh-UQA12Frg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2 class="zpheading zpheading-align-center " data-editor="true">The first Wireless Tech Summit</h2></div>
<div data-element-id="elm_J-OaVMm9Tva_kFd3SiHy6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:left;margin-bottom:24px;">This month (November 2024),&nbsp;<a href="https://www.linkedin.com/in/mackenziewifi" target="_blank" rel="noreferrer noopener">Peter Mackenzie</a>&nbsp;and I are co-hosting the first&nbsp;<a href="https://www.wirelesstechsummit.com/" target="_blank" rel="noreferrer noopener">Wireless Tech Summit</a>, a Wi-Fi training and certification mini-event. The best part? It will be in-person here in North Carolina!</p><p style="text-align:left;margin-bottom:24px;">Okay, maybe that’s not actually the&nbsp;<em>best&nbsp;</em>part. The&nbsp;<em>best&nbsp;</em>part is probably the concept overall. We wanted to give people access to training and peer connections they may not otherwise have, and do it at a critical time in Wi-Fi history.</p><p style="text-align:left;margin-bottom:24px;">The FCC has opened new spectrum so we’re managing 2.4Ghz, 5GHz, and now 6GHz with Wi-Fi 6E and Wi-Fi 7, and that has huge implications for both the design and security of our networks. Plus, Wi-Fi 6E and Wi-Fi 7 require WPA3 security and unfortunately, there’s no easy button for migrating from WPA2 to WPA3.</p><p style="text-align:left;margin-bottom:24px;">So, we thought we could get together, co-host a mini-event, and give people four days of training and certification coupled with peer networking and social events. Plus, some special joint labs, testing, and guest speakers to round it out!</p><p style="text-align:left;margin-bottom:24px;">It’s bigger than a training, and smaller than a conference. A way to maximize time and precious training budget without having to give up a weekend.</p><p style="text-align:left;margin-bottom:24px;">The&nbsp;<a href="https://www.wirelesstechsummit.com/" target="_blank" rel="noreferrer noopener">November 2024 event</a>&nbsp;offers a choice from two training classes:</p><ul><li style="text-align:left;"><a href="https://www.wirelesstechsummit.com/WirelessTechSummit2024#/wlandesignandhaminacourse">Wi-Fi Design and Hamina Certified Network Architect</a>&nbsp;with Peter Mackenzie</li><li style="text-align:left;"><a href="https://www.wirelesstechsummit.com/WirelessTechSummit2024#/securewifi">Secure Wi-Fi Architecture Masterclass</a>&nbsp;and Certification with me (Jennifer Minella) and Jonathan Davis</li></ul><p style="text-align:left;margin-bottom:24px;">All three of us are practitioners. Meaning, we teach only part time and the rest of our time is focused on doing the work related to our class content. The content is not only fresh and timely but also real-world and hyper applicable to the daily roles of engineers and architects.</p><p style="text-align:left;margin-bottom:24px;"><img src="https://www.viszensecurity.com/photos-2024wlpc-securewificlass-01.jpg" style="color:inherit;text-align:center;width:410.42px !important;height:310px !important;max-width:100% !important;">&nbsp; &nbsp; &nbsp;&nbsp;<img src="https://www.viszensecurity.com/Promo%20class%20images.png" style="color:inherit;width:310px !important;height:310px !important;max-width:100% !important;"></p><p style="text-align:left;margin-bottom:24px;"><span style="color:inherit;">Peter is arguably one of the best and most popular Wi-Fi instructors in the the world. He’s not only teaching the course, he developed it (and many others). You can find his full offering at&nbsp;</span><a href="https://www.mqts.co.uk/" target="_blank" rel="noreferrer noopener">MQ Training Services</a><span style="color:inherit;">, based out of the UK, including a suite of the&nbsp;</span><a href="https://www.mqts.co.uk/cwnp-training" target="_blank" rel="noreferrer noopener">CWNP courses</a><span style="color:inherit;">&nbsp;such as CWNA, CWDP, and CWAP.</span></p><p style="text-align:left;margin-bottom:24px;"><a href="https://www.linkedin.com/in/jonathanadavis/" target="_blank" rel="noreferrer noopener">Jonathan Davis (JD)</a>&nbsp;is also a CWNP-certified instructor and CWNE (Certified Wireless Network Expert) and brings deep Wi-Fi knowledge to our security architecture class, where I of course dive into the depths of security from technology to compliance.</p><p style="text-align:left;margin-bottom:24px;">As for me, well I’ve been doing network security for over 20 years and layer that with 15+ years deeply focused on more holistic security architecture addressing all aspects of security. The class is based on those 20 years of experience working with and in hundreds of client environments across all industries. It's also based in large part on my recent book, "<span style="font-weight:bold;"><a href="https://www.amazon.com/Wireless-Security-Architecture-Maintaining-Enterprise/dp/1119883059">Wireless Security Architecture</a></span>" published with Wiley.</p><p style="text-align:left;margin-bottom:24px;">Check out more class details on the event site, including videos. We’d love to have you join us at this or another upcoming event!</p><p style="text-align:left;margin-bottom:24px;">Also- be sure to&nbsp;<a href="https://www.linkedin.com/in/jenniferminella/" target="_blank" rel="noreferrer noopener">follow me on LinkedIn</a>&nbsp;for more regular updates.</p><p style="margin-bottom:24px;">Interested in future dates and/or corporate training for your team? <a href="/contact" title="Contact us!" rel="">Contact us!</a></p><p style="margin-bottom:24px;"></p><div style="text-align:left;"><span style="font-weight:700;color:inherit;">Wireless Tech Summit</span></div>
<div style="text-align:left;"><span style="color:inherit;">Training and Certification Mini-Event</span></div>
<div style="text-align:left;"><span style="color:inherit;">November 12-15, 2024</span></div>
<div style="text-align:left;"><span style="color:inherit;">Raleigh, NC, USA</span></div>
<div style="text-align:left;"><a href="https://www.wirelesstechsummit.com/" target="_blank" rel="noreferrer noopener">https://www.wirelesstechsummit.com/</a></div>
<p></p></div></div></div><div data-element-id="elm_QQr8RBxRROSw9_lilnfZnw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Fri, 01 Nov 2024 07:30:00 -0400</pubDate></item><item><title><![CDATA["Wireless Security Architecture" Now Shipping Worldwide]]></title><link>https://www.viszensecurity.com/blogs/post/wireless-security-architecture-now-shipping-worldwide</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Photo-book02.jpg"/>My new book published with Wiley, &quot;Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise&quot; is now shipping ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_DiYKLAJtQ7yElPtO0u4Jkg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7KSGYmyvSFSKmPKxVYhFuA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IgiUHDdyQNiZuSBECgqJ5A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_iLfcW_plTJ6vgE8-Okx-LQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p>My new book published with Wiley, "Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise" is now shipping worldwide. Available as e-book and in print from Wiley, Amazon, and book retailers near you! <br></p></div>
</div><div data-element-id="elm_8Ix6v9kgQR6MNijyGsUJ6A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Ix6v9kgQR6MNijyGsUJ6A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.amazon.com/Wireless-Security-Architecture-Maintaining-Enterprise/dp/1119883059" target="_blank" title="Find on Amazon"><span class="zpbutton-content">Find on Amazon</span></a></div>
</div><div data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"] .zpimagetext-container figure img { width: 278.06px !important ; height: 202px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"] .zpimagetext-container figure img { width:278.06px ; height:202px ; } } @media (max-width: 767px) { [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"] .zpimagetext-container figure img { width:278.06px ; height:202px ; } } [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="https://www.viszensecurity.com/Photo-book02.jpg" width="278.06" height="202" loading="lazy" size="custom" data-lightbox="true"></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><ul><li>More information, resources, and the full table of contents is available at my blog site at <a href="http://securityuncorked.com/books/" title="https://securityuncorked.com/books" target="_blank" rel="">https://securityuncorked</a><a href="http://securityuncorked.com/books/" title="https://securityuncorked.com/books" target="_blank" rel="">.com/books</a>.<br></li><li>Order from <a href="https://www.amazon.com/Wireless-Security-Architecture-Maintaining-Enterprise/dp/1119883059" title="Amazon" target="_blank" rel="">Amazon</a>. <br></li><li>Follow me on <a href="https://twitter.com/jjx" title="Twitter @jjx" target="_blank" rel="">Twitter @jjx</a> and the <a href="http://securityuncorked.com/" title="Security Uncorked blog" target="_blank" rel="">Security Uncorked blog</a> for more updates and giveaways. <br></li><li>Sign up for <a href="https://zc.vg/F4LNa" title="book-specific updates by email" target="_blank" rel="">book-specific updates by email</a>. Your information is never shared with third parites.</li></ul></div>
</div></div></div></div></div></div></div>]]></content:encoded><pubDate>Tue, 12 Apr 2022 10:14:52 -0400</pubDate></item><item><title><![CDATA[Showdown: Zero Trust vs. NAC]]></title><link>https://www.viszensecurity.com/blogs/post/the-difference-between-zero-trust-and-nac</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/blog-zt-vs-nac.jpg"/>In the world of zero trust networking, organizations are asking how a zero trust approach fits in with their network access control (NAC) strategy. Here are some thoughts on what you should be considering as you navigate zero trust and NAC.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_31v-PJvRS9a_rDn_bz9yLQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_dLgRCtENQfuoP_z3B6fbHg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_okIXXwxtSBWOcQotm3yJug" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"> [data-element-id="elm_okIXXwxtSBWOcQotm3yJug"].zpelem-col{ border-radius:1px; } </style><div data-element-id="elm_dWEmWuAmTaalUR2ckVZD_w" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_dWEmWuAmTaalUR2ckVZD_w"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><p><span style="color:inherit;"></span></p><p style="text-align:left;"><span style="font-size:12pt;">In the world of zero trust networking, organizations are asking how a zero trust approach fits in with their network access control (NAC) strategy. </span><span style="font-size:12pt;">He</span><span style="font-size:12pt;">re are some thoughts on what you should be considering as you navigate zero trust and NAC. </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Concepts vs. products</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">The first major difference in zero trust and NAC is that zero trust is a concept or trust model for information security, versus NAC which is a specific product category. Although ther</span><span style="font-size:12pt;font-weight:400;">e are different types of NAC products today, the market has settled down considerably and all operate within a relatively narrow scope of enforcement and features compared to ten years ago. </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">The many flavors of zero trust architectures</span></p><p style="text-align:left;"><span style="font-size:12pt;">Before we continue, let's untangle the co-mingling of zero trust as it relates to network and application access versus access between virtualized hosts. Although conceptually the same - the goal of zero trust being to move from an implicit to more granular explicit authorization - the execution, products, and vendors are very different for network-based technologies than for virtualized environments (whether they be on</span><span style="font-size:12pt;">-prem, in cloud, or hybrid). </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">For today's discussion, we're focused on the former - the technology that would/could replace (or enhance) traditional network-based NAC products for identification and authorization of users and endpoint devices in your environment. We'll leave the other topic for another day. </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Implicit vs explicit authorization </span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">The model of a zero trust architecture is to "verify then trust" versus the more common approach of NAC with the "trust but verify" sequence. While - yes - some NAC implementation</span><span style="font-size:12pt;font-weight:400;">s do offer a "verify then trust" model, the next step after trust is typically an implicit authorization to a network or networks, which is exactly what zero trust security tries to avoid. </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Network-based vs. application-based enforcement </span></p><p style="text-align:left;"><span style="font-size:12pt;">Strictly speaking in a perfect world, a zero trust approach will include a trust model that offers a user (or device) only the specific access to the resources needed per-task. That's a tall order with the current technologies we have, and traditional NAC vendors will all fall short here, even with the holy grail that is microsegmentation. At best with NAC, we're doing identification and authentication of a device and/or user, and then giving them some level of access at network layers 2 or 3. Contrast this with the approach of a zero trust solution performing the same (or more extensive) identification and authentication, but with the added ability to control resource access up through the application layer. </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">One of the reasons secure access service edge (SASE) solutions fit so well with zero trust strategies is because of the ability to make very granular authorizations to a user or device, based on myriad contextual elements (who, what, when, where, how). </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Managing users on-prem vs. remote </span></p><p style="text-align:left;"><span style="font-size:12pt;">The next bugaboo with NAC is the limitations in controlling resource access on remote users and devices. Our current network-based NAC products are designe</span><span style="font-size:12pt;">d to control access at the point of (managed) network connection - that could be at a wired port in the facility, a&nbsp;corporate wireless SSID, or a remote access VPN in to the organization. But then, that's it. Traditional NAC products weren't designed to manage and control connections from endpoints floating out and about on the internet as people travel or work from home. </span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">The conversation could again turn towards SASE and the features that swirl around it - SD-WAN, CASB, and SWG specifically. However, certainly not all organizations have moved to a 100% remote workforce, meaning there's still a need to secure access to internal resources when a user is in the office. This reality makes traditional NAC a still-attractive offering, and is an area SASE will need to continue developing.&nbsp;</span></p><p style="text-align:left;"><span>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Can NAC products play a role in a zero trust strategy? </span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">Yes, absolutely - but with some caveats. If your NAC-based zero trust strategy relies on microsegmentation, know that it's not really the holy grail it's touted to be, and among other limitations it's not the easiest architecture to implement. As we just mentioned, there's still a place in the world for traditional NAC for organizations with a primary focus on on-prem security. Plus, in recent years most NA</span><span style="font-size:12pt;font-weight:400;">C vendors have bolster</span><span style="font-size:12pt;font-weight:400;">ed their endpoint agents and are heading towards the type of granular control organizations will want in a zero trust network.</span></p><p style="text-align:left;"><br></p><p style="text-align:left;"><img src="https://www.viszensecurity.com/blog-zt-vs-nac.jpg" style="width:447.6px;height:330px;"><br><span style="font-size:12pt;font-weight:400;"><span style="color:inherit;"></span></span></p><p></p><div style="text-align:center;"><br></div>
</div></div><div data-element-id="elm_585Mlsg7Rk2XdDB6dxriLw" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_585Mlsg7Rk2XdDB6dxriLw"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://zc.vg/K5Fzk" target="_blank"><span class="zpbutton-content">Get more insights!</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 30 Jun 2021 16:30:00 -0400</pubDate></item><item><title><![CDATA[The CIO's Guide to Secure Access Service Edge (SASE) Architecture]]></title><link>https://www.viszensecurity.com/blogs/post/secure-access-service-edge-sase-architecture-a-primer-for-cxos</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Tue Jun 29 2021.png"/>Here's a quick down and dirty primer comparing the new Secure Access Service Edge (SASE) architecture to our traditional perimeter security methods.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_iwAvcGXwSdWLLHNm2g5Nbw" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_loZ_GzKQS8CoCrbQIYKAnA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_V1fSkzXMSE2QWIkzy6869Q" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_6yfmUNRZRhiqAnc1S4yH5g" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_6yfmUNRZRhiqAnc1S4yH5g"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p><span style="color:inherit;"></span></p><p style="text-align:left;"><span style="font-size:12pt;">If you're tired of hearing about the "new normal" post-pandemic, hold on to your knickers because some of the outcomes from COVID's business impact are here to stay. Really, it's not a bad thing and we're long overdue for an overhaul of how we identify, authenticate, connect, and authorize access for users and devices. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Here's a quick down and dirty primer comparing the new Secure Access Service Edge (SASE) architecture to our traditional perimeter security methods. </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Executive View of SASE Architecture<br></span></p><p style="text-align:left;"><span style="font-size:12pt;">From the 10,000-foot view, the three most pertinent points are:</span></p><ol><li><p style="text-align:left;"><span style="font-size:12pt;">SASE is one solution offering that's part of a larger (or longer) zero trust security strategy. As you'll see in the graphic below, SASE enforces the underlying principle of a zero trust network by not extending implicit access to resources. Meaning, what a user or a device can do or access is explicitly defined in the SASE fabric. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">SASE is more of a service set than a single product; it's cloud-based and 'follows' endpoints and users wherever they go, or in the case of work from home -- wherever they <span style="font-style:italic;">don't go</span>. SASE vendors do this with a global cloud PoP network so endpoints connect to the cloud to access resources, vs. connecting to a traditional on-prem datacenter and then egressing. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">SASE is likely to deliver on promises of increased simplicity and security with decreased cost, but there will be a certain amount of vendor lock-in as well as overlap with other products related to zero trust and endpoint security that the C-suite should prepare for. </span></p></li></ol><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;font-weight:700;">Technical View of SASE Architecture<br></span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">Since this is a C-level primer, I'm not going to dive too deeply in to the nuts and bolts, but I know the CISOs and CIOs I work with, and most of you love a little technical meat. </span></p><ol><li><p style="text-align:left;"><span style="font-size:12pt;">From an implementation standpoint, how SASE is implemented and what it can (or can't) do is dependent in large part on the vendor. Some SASE vendors came from cloud access server broker (CASB) and secure web gateway (SWG) pedigree; others from firewall and network security. Mileage and roadmaps will vary. How they handle guest (or un-managed devices) as well as users that happen to be on-prem may also vary.</span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">SASE has myriad features (vendor-dependent), with support for zero trust networking being just one. Re</span><span style="font-size:12pt;">placing legacy VPNs terminating to on-prem datacenters is a great way to enter the SASE world, and then continue adding features as you go. <br></span></p></li></ol><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">Graphic: SASE Architecture vs Traditional Perimeter</span></p><p style="text-align:left;"><span style="font-size:12pt;">For those of you who haven't worked with me yet, I love to draw and doodle. I don't know about you, but I'm very visual and find a picture really is worth more than a thousand words. And who has time to read a thousand words? Here are just a few highlights of the SASE graphic. </span></p><ol><li><p style="text-align:left;"><span style="font-size:12pt;">On left you see a traditional network security perimeter where we may (at best) have LAN-based connections (wired or wireless) with authentication and perhaps dynamic segmentation with VLANs or downloadable ACLs. For remote access, we see a traditional VPN model with similar features to the LAN connections. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">On the right you see a typical SASE architecture with enforcement and decision layers plus SASE elements shown in yellow. One of the benefits of this SASE architecture is to abstract from physically-defined connections (those we control at layers 1-3) and instead apply granular context-based enforcement at layer 7 for both on-prem and in-cloud resources. </span></p></li></ol><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;"><img src="https://www.viszensecurity.com/Tue%20Jun%2029%202021.png"></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span>&nbsp;</span></p><p></p></div>
</div><div data-element-id="elm_BJ5oSqF_QliH1mm4AuBpQQ" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_BJ5oSqF_QliH1mm4AuBpQQ"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://zc.vg/K5Fzk" target="_blank"><span class="zpbutton-content">Get more insights</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Mon, 28 Jun 2021 19:15:00 -0400</pubDate></item><item><title><![CDATA[Wireless Security Trends (CISO Network Security Cheat Sheet)]]></title><link>https://www.viszensecurity.com/blogs/post/wireless-security-trends-ciso-network-security-cheat-sheet</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/blog-ciso-network-cheatsheet-wireless-security.jpg"/>A quick overview of 3 top trends in wireless security for CISOs and CIOs with a look at new WPA3 security, WiFi 6E, and CBRS/Private LTE/Private 5G with 1-3 key take-aways for each technology trend.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Kv_ld3axSpiPWDOO1zYgOA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rlM6SwVoSCGwd05C7KwcGQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Wei-9RUST3aO5l-gj3KtiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QoZEMFx-STiHS2yMu6rkQA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QoZEMFx-STiHS2yMu6rkQA"].zpelem-heading { border-radius:1px; } </style><h4 class="zpheading zpheading-align-center " data-editor="true">Excerpt from Jen's presentation at ISSA Cyber Executive Forum<br></h4></div>
<div data-element-id="elm_JbceawaiTYiMUqnSvWvWVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JbceawaiTYiMUqnSvWvWVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><span style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">Last month, I delivered a whirlwind of a presentation hitting on today's and tomorrow's top network security trends CISOs should know about. The full content covered security trends in 3 areas: 1) Wireless, 2) Secure Edge, and 3) Operations. Today we're looking at the high level wireless security topics, and I'm just going to cover three so this doesn't turn in to a novel.&nbsp; </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">1. WiFi WPA3 </span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">WiFi Protected Access (WPA) 3 is the latest evolution of security for 802.11 wireless LANs (the normal wireless standard we use daily). It's the first major security enhancement in over a decade, which is stunningly embarrassing in an industry where vulnerabilities and new attacks emerge daily. With the updates, we'll see enhanced cryptography protocols (including the addition of elliptic curve), much better downgrade attack protection, support for unauthenticated encryption (meaning encrypting guest portals and such), as well as an upgrade to the operation of what's currently known as pre-shared key (PSK), via a new protocol called simultaneous authentication of equals (SAE). </span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">Take-aways: </span></p><ul><li><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">There's a lot to know when planning a WPA3-enabled network so we'll dive in to this more at a later date. For now, know that this is out, it's available, it's supported in your enterprise WiFi infrastructure, and your organization should be ensuring new endpoints (especially headless/IoT devices) support this. </span></p></li><li><span style="font-size:12pt;font-weight:400;">For the network and WiFi architects, we'll be providing additional guidance on how to properly architect with these new features for the greatest security benefit and to meet compliance requirements. <br></span></li></ul><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">2. WiFi 6E</span></p><p style="text-align:left;"><span style="font-size:12pt;">Usually referred to as WiFi 6 "extended" or "enhanced" (not a real name, just a pet name we gave it), WiFi 6E is WiFi 6th generation (802.11ax technology) over the newly-opened 6GHz spectrum. We can barely keep up with all the WiFi terms, so I'm not going to assume any knowledge here. To put it in perspective, for decades, we've been using WiFi over 2.4GHz and 5GHz spectrum. The road to opening additional spectrum (in this case 6GHz) for unlicensed use has been a multi-year escapade for the WiFi industry and the FCC. Radio frequency changes in our WiFi infrastructure and endpoints are hardware (not software) changes. The benefit will be more security (through force), support for higher density of devices, and ultimately the ability to increase throughput. <br></span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Take-aways: </span></p><ul><li><p style="text-align:left;"><span style="font-size:12pt;">Even though WiFi 6E is an 'extension' of WiFi 6, there will be </span><span style="font-size:12pt;font-style:italic;">mandatory</span><span style="font-size:12pt;"> security features and removal of support for many deprecated features commonly used today in WiFi 6 (802.11ax) networks. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">Because it's a hardware upgrade, organizations interested in this technology should be sure to procure WiFi infrastructure and endpoints with radios that support 6GHz. If you're not sure if WiFi 6E is something you should be looking at, drop us a note and we can help.<br></span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">Our tools for monitoring and securing WiFi over the air will also need an upgrade, so set aside budget for re-tooling and training for your teams.&nbsp; </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">And to further complicate things, use of the new spectrum and additional radios will also mean organizations should be investing in edge switching products that support the latest power over Ethernet standards (these puppies will need the juice) as well as multi-gig Ethernet ports (the higher data throughput supported will oversubscribe 1Gbps edge ports). </span></p></li></ul><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;font-weight:700;">3. CBRS and Private LTE/Private 5G</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">This is a pretty cool one, because of the myriad use cases that can help organizations of all sizes and industries. Private LTE/5G is simply the use of cellular RF technology for private use. So, it would be like having a cellular network that's used and managed just like your regular WiFi - except with added security. Your data doesn't traverse a carrier (unless that's your chosen egress) and you own and manage the hardware, typically through a coordinated cloud platform. </span></p><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">CBRS is probably exactly what you think it is - Citizen Broadband Radio Service. It's just that in the Private LTE world here in the U.S. that's the radio spectrum we chose to use. We refer to it as band 48, and it's in the 3+GHz range between our traditional WiFi of 2.4 and 5GHz. Private LTE technology gives users a WiFi-like user experience with the benefits of cellular-- specifically enhanced security through SIM/eSIM, coverage over much longer distances, support for higher density, and a much greater resiliency of signal (virtually no interference as we have with WiFi). </span></p><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">Take-aways:</span></p><ul><li><p style="text-align:left;"><span style="font-size:12pt;">CBRS/Private LTE/5G should be on every CIO's/CISO's radar because of the volume of use cases and problems it can solve in today's digital transformation projects and the enhanced security it can provide for IoT.</span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">This technology has several real-world case studies from connectivity for critical devices in hospitals, to sensitive OT devices, public venues, municipal wireless in rural communities (by towns and schools), and the list goes on. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">A <span style="font-style:italic;">lot </span>of devices come with Private LTE support. In addition to mobile phones and tablets, many handheld scanners, OT and IoT devices and sensors and even laptops support Private LTE. And that list is growing. </span></p></li></ul><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p></span><div><span style="color:inherit;"><span style="font-size:12pt;">Those were the 3 key wireless security trends I wanted to hit on today. We'll keep diving more in to these, and I'll share more content from this and other presentations and workshops as we go. <br></span></span></div>
<div><span style="color:inherit;"><span style="font-size:12pt;"><br></span></span></div>
<div style="text-align:center;"><span style="color:inherit;"><span style="font-size:12pt;"><img src="https://www.viszensecurity.com/blog-ciso-network-cheatsheet-wireless-security.jpg"></span></span></div>
</div></div><div data-element-id="elm_nK8CNWTITPeRYLfQqGkloA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_nK8CNWTITPeRYLfQqGkloA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://zc.vg/K5Fzk" target="_blank"><span class="zpbutton-content">Get more insights</span></a></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 23 Jun 2021 20:05:00 -0400</pubDate></item><item><title><![CDATA[Hello, world.]]></title><link>https://www.viszensecurity.com/blogs/post/hello-world.</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/bigstock-182091265.jpg"/>Stay tuned! ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_p3p_td5FTvuUIjWSz71ipQ" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_kqmI0kxTRICy6YjXMqOGkQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_BinVzMn5TkyakvAGtzCXoA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_EUUE7g8RRQS3CkfXIhFrfQ" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_EUUE7g8RRQS3CkfXIhFrfQ"].zpelem-heading { border-radius:1px; } </style><h2 class="zpheading zpheading-align-center " data-editor="true">More content is coming your way.<br></h2></div>
<div data-element-id="elm_qQIDv2D0QIW79qNU9R6CYA" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_qQIDv2D0QIW79qNU9R6CYA"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-center " data-editor="true"><p>Stay tuned!<br></p></div>
</div></div></div></div></div></div>]]></content:encoded><pubDate>Wed, 16 Jun 2021 21:08:00 -0400</pubDate></item></channel></rss>