Transcript
Podcast Host (0:02)
You're listening to the Cyberwire Network, powered by N2K. Most security conferences talk about Zero Trust Zero Trust World puts you inside this is a hands on cybersecurity event designed for practitioners who want real skills, not just theory. You'll take part in live Hacking labs where you'll attack real environments, see how modern threats actually work, and learn how to stop them before they turn into incidents. But Zero Trust World is more than labs. You'll also experience expert led sessions, practical case studies and technical deep dives focused on real world implementation. Whether you're blue team, red team, or responsible for securing an entire organization, the content is built to be immediately useful. You'll earn CPE credits, connect with peers across the industry and leave with strategies you can put into action right away. Join us March 4th through the 6th in Orlando, Florida. Register now@ZTW.com and take your Zero Trust strategy from theory to execution.
Tim Nodar (1:28)
The word is Secure Web gateway. Spelled secure as in protection from malicious activity, Web as in the Internet, and gateway as in a tool that regulates web traffic. Definition a layer 7 firewall that sits in line at the boundary between the Internet and an organization's network perimeter that allows security policy enforcement and can perform certain prevention and detection tasks. Example sentence the secure Web gateway prevented the user from accessing a malicious website. Origin and context in 1988, Jeff Mogul, Brian Reed, and Paul Vicsey, working for Digital Equipment Corporation, conducted the first research on firewall technology. This was the first generation of firewall architectures. Between 1989 and 1990, Dave Presetto and Howard Trickey of Bell Labs pioneered the second generation with their research in circuit relays. They also implemented the first working model of the third generation firewall architectures, known as application layer firewalls. Between 1990 and 1991, Gene Spafford of Purdue University, Bill Cheswick of Bell Labs and Marcus Random independently researched application layer firewalls. These application layer firewalls eventually evolved into next generation firewalls. Many years later, Marcus Random's firewall work received the most attention and took the form of Bastion Host running Proxy Services. In 1992, Digital Equipment Corporation shipped Dex Seal, the first commercial firewall, and included proxies developed by random. In 1994, Check Point software released the first stateful inspection commercial firewall, a layer three firewall that allowed security policy based on IP addresses, ports, and protocols. In 1994, William Cheswick and Steve Bellavin published Firewalls and Internet Security Repelling the Wily Hacker, the first book on firewalls as a technology. They called it a circuit level gateway and packet filtering technology. Interestingly, their ideas came from the desire not to keep intruders out of their networks, but to keep employees from going to bad places on the Internet. Palo Alto Networks launched the first next Generation Firewall in 2007, a firewall that not only does stateful inspection at layer three, but but most importantly, allows rules at the application layer. Layer seven firewall administrators could not only block network traffic to and from bad IP addresses, but could also block access to applications tied to the authenticated user. In other words, the marketing department can go to Facebook, but the developers can't. Next generation firewalls gave infosec leaders the first ability to enforce rudimentary zero trust policy. By the 2000 and tens, some firewalls had morphed into giant orchestration engines. In other words, instead of deploying multiple independent security tools in line at the perimeter that infosec teams had to manage and orchestrate separately, the next generation firewall became a Swiss army knife of security tools. One box either hardware or software that could do layer three policy layer seven policy, intrusion detection, anti malware, XDR, etc. By the late 2000 and tens, the secure web gateway emerged as a simpler firewall that abandoned the orchestration engine idea and just performed layer 7 policy functions. According to Gartner's information technology glossary, these gateways must, at a minimum, include URL filtering, malicious code detection and filtering, and application controls for popular web applications such as instant messaging and Skype. Native or integrated data leak prevention is also increasingly included. Nerd reference in 2015, Bill Cheswick presented at the Vintage Computer Federation conference and talked about some of the early days of computer security when he took a job at the famous Bell Labs in the late 1980s and worked for computer science legends like Dennis Ritchie, the cochurist of the C programming language and the Unix operating system. Written in C with colleagues Ken Thompson, Brian Kernighan, and Rob pike, and he talked about how his experiments with a proto firewall protected Bell Labs from the infamous Morris worm in the late 1980s.
![Secure Web Gateway (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fmegaphone.imgix.net%2Fpodcasts%2F8ea0ecb4-0082-11f1-ad03-e3c7ba336422%2Fimage%2F441b0ca2db080b93b935568d381ce462.png%3Fixlib%3Drails-4.3.1%26max-w%3D3000%26max-h%3D3000%26fit%3Dcrop%26auto%3Dformat%2Ccompress&w=1920&q=75)