Harshal ShahforHarshal_Shah' Blogdelvingwithharshal.hashnode.dev·Jul 21, 2024Redefining Cybersecurity with the Zero Trust ModelIn today's hyperconnected digital landscape, where data breaches and cyber threats loom large, traditional approaches to cybersecurity are proving inadequate. The perimeter-based security model, which relies on trusting users and devices within a def...DiscussFortify and Defend: Navigating the Cybersecurity Landscapezero trust security
Raicode.flatmarstheory.com·Jun 1, 2024Embracing the Zero-Trust Security ModelIn the ever-evolving digital landscape, traditional perimeter-based security models are becoming increasingly inadequate. The rise of distributed systems, remote workforces, and cloud computing has blurred the boundaries of the traditional network pe...Discusscybersecurity
Brian BaldockProblog.brianbaldock.net·May 22, 2024Microsoft Authenticator on Windows? No thank you.As we dive deeper into the world of cybersecurity, Microsoft's Zero Trust model stands out as a leading framework with its "never trust, always verify" mantra. This approach ensures that every access request is authenticated, authorized, and encrypte...Discuss·373 readsmicrosoft authenticator app
Siddhant Khistysiddhantkhisty.com·May 6, 2024Past, Present & Future of Zero Trust Security and How Can You Implement It on a Kubernetes ClusterIn today's day and age, companies store all their data on either an on-prem setup or on a cloud-based service. This includes sensitive data such as customer payment details, passwords, access tokens and more. This makes it all the more important and ...Discusszero trust security
Jackson Markrealtech.hashnode.dev·May 6, 2024Exploring the New Era of Zero Trust in 2024In the rapidly evolving landscape of cybersecurity, staying ahead of threats requires a proactive and dynamic approach. As organizations navigate an increasingly complex digital environment, traditional security models are proving inadequate in safeg...Discusszero trust security
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Apr 26, 2024No Listening Ports?Not too long ago, I authored a post about why Go is Amazing for Zero Trust. In that post, I write about one of OpenZiti's superpowers that allows your applications to have no listening ports by integrating an OpenZiti SDK into it. It's always interes...Discuss·1 like·420 readszerotrust
Jiyajiyajha.hashnode.dev·Feb 20, 2024Zero Trust in Action: Unveiling Microsoft's Internal Security TransformationThe modern enterprise's technological landscape has evolved due to the growing adoption of cloud-based services, mobile computing, the internet of things (IoT), and bring your own device (BYOD) policies. For a workforce that frequently needs access t...Discusszero trust security
Jimmyblog.jimmytee.dev·Jan 16, 2024Zero Trust Network Architecture (ZTNA) 🤔👮Zero Trust security concept Zero Trust security is a modern IT security model that requires strict verification/authentication for every request coming from a person, a bot, a microservice or a device within or outside of the network to access resour...Discuss·1 like·48 readsAWS
Taegu Kangktg0210.hashnode.dev·Jan 10, 2023AWS Ground RulesGood for Security (Zero Trust) and saves traffic cost Do not use the root user for the common case. Use individual IAM users. Use MFA for Every IAM user including root account. Use Role not Accesskey. Separate VPC for ENV such as dev, staging...DiscussAWS Basic Good for Security (Zero Trust) and saves traffic cost