Saurabh Gerasaurabhgera.hashnode.dev·Nov 9, 2024Saurabh Gera: A Technical Leader in Network, Security, and Cloud ArchitectureSaurabh Gera is a Principal Architect at UnitedHealth Group, recognized for his leadership in network, security, and cloud infrastructure within large-scale organizations. With over 15 years of experience, Saurabh is known for his technical expertise...AI/ML in Network Security
Utkarsh Kumarutkarsh89.hashnode.dev·Oct 26, 2024Zero Trust Architecture: Implementing a "Never Trust, Always Verify" Security ModelIn today's digital landscape, cyber threats are becoming increasingly sophisticated, rendering traditional perimeter-based security models inadequate. The rise of remote work, cloud computing, and interconnected devices has expanded the attack surfac...20 likeszero trust security
Hari Prassad Kannanthe-it-spectrum.hashnode.dev·Oct 11, 2024"Never trust, always verify" - Understanding Zero TrustIntroduction In an era where cyber threats have become increasingly sophisticated, traditional security models that rely on static, perimeter-based defenses are no longer sufficient. The concept of Zero Trust emerged as a response to these growing c...11 likes·68 readszero-trust
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Multifactor Zero Trust sshThe previous post revisited the zssh project and demonstrated how to implement a simple ssh client using the extended modules provided by the Golang project. It also modified that simple program and showed what it takes to incorporate OpenZiti, creat...479 readszero-trust
Sabin Shresthawww.sabinshrestha.com·Sep 8, 2024The Rise of Zero Trust Security: Why It's Essential for Modern Businesses in a Hybrid Work EnvironmentAs businesses around the globe adopt hybrid work models, balancing between on-premise and remote operations, traditional cybersecurity measures are becoming less effective. The growing sophistication of cyberattacks, coupled with the need to secure a...zero trust security
Abhiramcloudbuddy.hashnode.dev·Sep 6, 2024Zero Trust for Critical Infrastructure: A Comprehensive GuideCritical infrastructure, such as power plants, water treatment facilities, and transportation networks, is essential for the functioning of modern societies. However, these systems are increasingly vulnerable to cyberattacks, making it imperative to ...zero trust security
Abhiramcloudbuddy.hashnode.dev·Aug 5, 2024Implementing a Zero Trust Architecture in the CloudThe traditional network security perimeter, built on the assumption of trust within the network, is no longer sufficient in today’s cloud-centric world. Zero Trust offers a more secure and adaptable approach, based on the principle of “never trust, a...zero trust security
Harshal Shahdelvingwithharshal.hashnode.dev·Jul 21, 2024Redefining Cybersecurity with the Zero Trust ModelIn today's hyperconnected digital landscape, where data breaches and cyber threats loom large, traditional approaches to cybersecurity are proving inadequate. The perimeter-based security model, which relies on trusting users and devices within a def...Fortify and Defend: Navigating the Cybersecurity Landscapezero trust security
Raicode.flatmarstheory.com·Jun 1, 2024Embracing the Zero-Trust Security ModelIn the ever-evolving digital landscape, traditional perimeter-based security models are becoming increasingly inadequate. The rise of distributed systems, remote workforces, and cloud computing has blurred the boundaries of the traditional network pe...cybersecurity
Brian Baldockblog.brianbaldock.net·May 22, 2024Microsoft Authenticator on Windows? No thank you.As we dive deeper into the world of cybersecurity, Microsoft's Zero Trust model stands out as a leading framework with its "never trust, always verify" mantra. This approach ensures that every access request is authenticated, authorized, and encrypte...417 readsmicrosoft authenticator app