Kindervags reporting and analysis helped crystallize zero trust concepts across. Its Tiered Access project goes hand-in-hand with the larger BeyondCorp project that challenges traditional security assumptions that private or internal IP addresses represented a more trusted device than those coming from the internet. In 2009, Google implemented a zero trust architecture referred to as BeyondCorp. It's the time of year when one might wonder what happened to that avuncular family figure whose existence was so reliably dull they passed into history almost forgotten - a little like Db2, IBM's flagship relational database that has faded from users' collective memory.īig Blue's system of choice for its mainframes and big Unix/Linux boxes is still very much alive and kicking and has even delivered a smattering of news in recent weeks, with a high profile attendee at the early December International Db2 Users Group European Conference telling us that select users were told of the new "Db2u", a set of containers for Db2 aimed at users exploring or working with the database in the cloud.Ĭonference speaker, Db2 DBA, and commentator Ember Crooks had posted earlier this year that "db2u sounds amazing to me" and that "db2u, conceptually, is a nearly cloud-native way of doing a relational database management system." But she also pointed out that "the problem I run into is that db2u is only available on RedHat OpenShift. The challenges of defining the perimeter to an organisations IT systems was highlighted by the Jericho Forum in 2003, discussing the trend of what was then coined de-perimiterisation.