Marvellous Kalucyberwriter.hashnode.dev·Dec 2, 2024Understanding Zero Trust Architecture as the Future of Modern CybersecurityIn previous years, companies only focused on perimeter security, which comprises firewalls, VPNs, and intrusion detection systems to secure the network boundaries and prevent unauthorized access to those outside the network. With cyberattacks becomin...1 likezero-trust
Chaitanya Rahalkarblog.rahalkar.dev·Dec 2, 2024Defense in Depth: Building Truly Resilient SystemsIn a dynamic landscape that is cybersecurity, the "defense in depth" principle has never been more fitting. Unfortunately, many organizations maintain a very simple approach to security: perimeter defense—internal systems are relatively exposed. The ...zero-trust
Chethana S Vchethanasv.hashnode.dev·Nov 28, 2024Embracing Zero Trust Architecture in DevOps: A Path to Unyielding SecurityIn today’s fast-paced tech world, where innovation moves at lightning speed, keeping systems secure is often overlooked until something goes wrong. This is where Zero Trust Architecture (ZTA) comes in—a modern approach that redefines how we think abo...28 readsDevops
Hari Prassad Kannanthe-it-spectrum.hashnode.dev·Oct 11, 2024"Never trust, always verify" - Understanding Zero TrustIntroduction In an era where cyber threats have become increasingly sophisticated, traditional security models that rely on static, perimeter-based defenses are no longer sufficient. The concept of Zero Trust emerged as a response to these growing c...11 likes·68 readszero-trust
linhbqforSRE Tribeblogs.sretribe.net·Oct 3, 2024Achieving Zero Trust Security on Amazon EKS with IstioThis is the fourth blog post of our “Istio on EKS” series. In this blog post, we’ll explore how Istio, a powerful service mesh, enables organizations to implement a zero trust security model on Amazon Elastic Kubernetes Service (Amazon EKS). We will ...zero
Saurabh Gerasaurabhgera.hashnode.dev·Sep 24, 2024**Saurabh Gera: A Technical Luminary in Healthcare Network, Security, and Cloud Architecture**Saurabh Gera stands as one of the brightest technical leaders in the healthcare industry, playing a pivotal role in transforming how healthcare enterprises approach network, security, and cloud architecture. As Principal Architect at UnitedHealth Gro...AI-driven security
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Zero Trust *ssh.ClientA few years ago, the OpenZiti project developed and published two client tools to make ssh and scp available over an OpenZiti overlay network without requiring the sshd port to be exposed to the internet. If interested, read the original posts about ...3 likes·3.0K readsZitifying Prometheuszero-trust
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Multifactor Zero Trust sshThe previous post revisited the zssh project and demonstrated how to implement a simple ssh client using the extended modules provided by the Golang project. It also modified that simple program and showed what it takes to incorporate OpenZiti, creat...496 readszero-trust
Jackson Markrealtech.hashnode.dev·Aug 29, 2024Zero Trust: Key Trends Shaping the Future of CybersecurityThe Zero Trust framework is gaining traction as the go-to approach for modern cybersecurity. It flips the traditional mindset on its head by assuming that no one—inside or outside the network—is inherently trustworthy. As threats evolve, so do the st...zero-trust
Christopher Wilsontechshopper.hashnode.dev·Aug 6, 2024Advanced Cybersecurity Architectures: Implementing Zero Trust in Complex NetworksIn today's digital landscape, cybersecurity threats are more sophisticated and pervasive than ever. Traditional security models, which often rely on perimeter defenses, are increasingly inadequate in protecting against modern attacks. As organization...Cybersecurity architectures