Siddhant Khistysiddhantkhisty.com·May 6, 2024Past, Present & Future of Zero Trust Security and How Can You Implement It on a Kubernetes ClusterIn today's day and age, companies store all their data on either an on-prem setup or on a cloud-based service. This includes sensitive data such as customer payment details, passwords, access tokens and more. This makes it all the more important and ...Discusszero trust security
Jackson Markrealtech.hashnode.dev·May 6, 2024Exploring the New Era of Zero Trust in 2024In the rapidly evolving landscape of cybersecurity, staying ahead of threats requires a proactive and dynamic approach. As organizations navigate an increasingly complex digital environment, traditional security models are proving inadequate in safeg...Discusszero trust security
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Apr 26, 2024No Listening Ports?Not too long ago, I authored a post about why Go is Amazing for Zero Trust. In that post, I write about one of OpenZiti's superpowers that allows your applications to have no listening ports by integrating an OpenZiti SDK into it. It's always interes...Discuss·1 like·304 readszerotrust
Jiyajiyajha.hashnode.dev·Feb 20, 2024Zero Trust in Action: Unveiling Microsoft's Internal Security TransformationThe modern enterprise's technological landscape has evolved due to the growing adoption of cloud-based services, mobile computing, the internet of things (IoT), and bring your own device (BYOD) policies. For a workforce that frequently needs access t...Discusszero trust security
Jimmyblog.jimmytee.dev·Jan 16, 2024Zero Trust Network Architecture (ZTNA) 🤔👮Zero Trust security concept Zero Trust security is a modern IT security model that requires strict verification/authentication for every request coming from a person, a bot, a microservice or a device within or outside of the network to access resour...Discuss·1 like·43 readsAWS
Taegu Kangktg0210.hashnode.dev·Jan 10, 2023AWS Ground RulesGood for Security (Zero Trust) and saves traffic cost Do not use the root user for the common case. Use individual IAM users. Use MFA for Every IAM user including root account. Use Role not Accesskey. Separate VPC for ENV such as dev, staging...DiscussAWS Basic Good for Security (Zero Trust) and saves traffic cost