Transcript
A (0:03)
Hey everyone, and welcome to this sponsored interview here in the Risky Bulletin feed. My name is Patrick Gray and everything you hear in the Risky Bulletin feed this week is brought to you by Knock Knock, which is a company that makes an interesting technology. I should disclose I'm on the board of this company, so obviously I'm a little bit biased. I quite, I quite love it. But yeah, the idea behind Knock Knock is it controls network connections and ties that control to authentication, right? So to your sso. So you know, you're on a network, say it's your internal network and you want to access the lights out management system. You try to access that system, you can't, it is all firewalled off. So then you go and you hit the Knock Knock, you know, web app, which is just an internal web application. You hit the SSO button and bang, magically, all of a sudden you can get a port to the lights out system and do what you need to do and that access will, you know, expire after 30 minutes. So it's sort of like just in time. Network access, network allow listing kind of is how you would describe it. It's useful both for external resources and increasingly internal resources where people are using it to protect things like KVM over ip, they're using it to protect lights out systems or old legacy stuff where they just don't want anyone on the network being able to access it. So joining me now is the chief executive of knock knock, Mr. Adam Poynton. And what we're going to be chatting about today is zero trust and how some users and companies are kind of doing it right and embracing zero trust principles and others aren't. And about how the definition of zero trust has kind of been lost. And I think, let me just start by positing, Adam, that one of the reasons I think zero trust, the definition got watered down, first of all, it turned into a marketing buzzword and everyone's like, we do zero trust. And it's like, well, no you don't. And second of all, I think the network access control part, which is what Knock knock does, it sort of dropped by the wayside when everyone's like, well, we'll just put oauth logins on all of these awful web applications and we'll consider that as an analog to network control. That seems to me to be like one of the major wrong turns that zero trust as a concept has taken over the last decade.
B (2:21)
Yeah, I agree with that. I think the zero trust architecture was the original idea, which is all about where the person is or where the system is, what network level access it has, what systems it can access. But you're right, that was sort of flipped into yes, marketing buzzword on the ZTNA side. But people saw the effectiveness of MFA and thought, well, I'm just going to kind of add auth everywhere and everyone's going to use the auth because that's the only way into the system apparently. And we're sort of going to solve it because every access is validated, verified, MFA is in there. It feels good. Let's let you know that that's going to solve our zero trust response when clearly not. That's. It isn't actually the premise of the architecture way of thinking in the zero trust architecture, that's just really adding authentication to as much as you possibly can, which is good. With still a lot of exemptions. It's great. Especially identity was a big problem. If you think, if you think mfa like it did actually solve a lot.
