Hacking Humans – "Microsegmentation (noun) [Word Notes]"
Podcast: Hacking Humans
Host: N2K Networks
Date: December 16, 2025
Theme: Deception, influence, and social engineering in the world of cyber crime – focusing in this episode on the security concept of microsegmentation.
Episode Overview
This episode centers on the cybersecurity concept of microsegmentation—a foundational technique for implementing zero trust security by isolating workloads within networks. The host guides listeners through the origins, technological evolution, and practical importance of microsegmentation, contextualizing it within both historical and modern networking paradigms. The episode also delivers an engaging analogy comparing microsegmentation to watertight compartments in submarines, emphasizing its real-world value in limiting the spread of cyberattacks.
Key Discussion Points & Insights
1. Definition of Microsegmentation
- [01:34]
- Microsegmentation is defined as:
"A zero trust security technique that isolates application workloads from each other, allowing each one to be protected individually."
- Example in context:
- “Microsegmentation prevented the attacker from moving to other systems within the network.”
- Microsegmentation is defined as:
2. Historical Context and Evolution
- [02:01 – 03:55]
- Early Security by Physical Separation:
- 1990s networks used physical separation (dedicated cables) to segment regular and sensitive traffic.
-
"One cable supported the normal day to day traffic of email and printing, and the other cable supported the network where the sensitive information resided...And never the twain shall meet."
- VLANs and Logical Segmentation:
- VLANs (Virtual Local Area Networks), conceived in the late ’90s, allowed logical separation of networks on shared hardware.
-
"You could tag network frames at layer two...Email and printing network traffic could ride the same physical network as the sensitive information traffic, but did not interact with each other."
- Software-Defined Networking:
- Stanford’s OpenFlow specification (2008-2009) enabled separating control and data planes, leading to network virtualization—critical in cloud and modern data centers.
-
"A network management abstraction layer that decouples functionality from the underlying hardware..."
- Early Security by Physical Separation:
3. The Shift to Microsegmentation
- [04:00 – 04:30]
- Shifts security from broad VLAN-level controls to highly granular workload isolation.
- With traditional means, attackers accessing a segment could see all resources within; microsegmentation limits exposure specifically to compromised workloads.
-
"...with microsegmentation, they can limit exposure to only the workload in question. This is a powerful zero trust tactic."
4. Physical World Analogy: Submarine Compartments
- [04:55 – 05:30]
- PJ Kerner (Illumio CTO) Quoted:
-
"The concept of segmentation is not new and exists in the physical world as well. So submarines are built with compartments that can be sealed off each other, so when there's a breach and the water floods into one compartment, the damage can be limited to a small part of the sub and it won't sink. That kind of physical resilience is required for submarines to remain safe, and you want to apply the same segmentation techniques to get similar cyber resilience for your organization."
-
- The analogy emphasizes how limiting blast radius—physically or digitally—provides resilience.
- PJ Kerner (Illumio CTO) Quoted:
Notable Quotes & Memorable Moments
-
On History and Progress:
- [03:05] “As networking evolved, actual physical separation of cables became impractical. But we soon realized you could accomplish the same thing at the logical level... with something called VLAN.”
-
On Zero Trust:
- [04:25] “Microsegmentation… is a powerful zero trust tactic.”
-
On Submarine Analogy:
- [05:02] PJ Kerner:
“Submarines are built with compartments that can be sealed off each other, so when there's a breach and the water floods into one compartment, the damage can be limited...and it won't sink... apply the same segmentation techniques to get similar cyber resilience for your organization.”
- [05:02] PJ Kerner:
Timestamps for Important Segments
- [01:34] – Introduction of "microsegmentation" as the episode's focus; definition and example
- [02:01 – 03:55] – Deep dive into the history: from physical separation to VLANs and software-defined networking
- [04:00] – Modern concept: From VLANs to microsegmentation and the zero trust model
- [04:55 – 05:30] – PJ Kerner's submarine analogy for segmentation and resilience
Conclusion
The episode provides a concise yet rich explanation of microsegmentation’s role in network security. It ties together the evolution from physical to logical segmentation, showcases how traditional models left gaps, and illustrates how microsegmentation provides a critical zero trust defense. Using accessible analogies and historical references, the podcast makes a complex concept memorable—even for listeners without technical backgrounds. The practical lessons apply broadly: security, in both digital and physical domains, benefits sharply from compartmentalization.
