Hazel Chirindahazelc.hashnode.dev·Feb 11, 2025Embrace Zero Trust: The Future of CybersecurityThe Problem with Traditional Security In the past, cybersecurity was like a castle with a moat—once you were inside, you were trusted. But with more people working from home, using cloud services, and facing more cyber threats, this old way doesn't w...zero-trust
Amurru Zeroukblog.amurru.dev·Feb 9, 2025Cybersecurity Trends 2025: Key Threats and Innovations Shaping the FutureIntroduction As we move further into 2025, the cybersecurity landscape continues to evolve at an unprecedented pace. With rapid technological advancements, increased reliance on digital infrastructure, and an ever-expanding attack surface, businesses...1 likeSecurity
Marvellous Kalucyberwriter.hashnode.dev·Dec 2, 2024Understanding Zero Trust Architecture as the Future of Modern CybersecurityIn previous years, companies only focused on perimeter security, which comprises firewalls, VPNs, and intrusion detection systems to secure the network boundaries and prevent unauthorized access to those outside the network. With cyberattacks becomin...1 likezero-trust
Chaitanya Rahalkarblog.rahalkar.dev·Dec 2, 2024Defense in Depth: Building Truly Resilient SystemsIn a dynamic landscape that is cybersecurity, the "defense in depth" principle has never been more fitting. Unfortunately, many organizations maintain a very simple approach to security: perimeter defense—internal systems are relatively exposed. The ...zero-trust
Chethana S Vchethanasv.hashnode.dev·Nov 28, 2024Embracing Zero Trust Architecture in DevOps: A Path to Unyielding SecurityIn today’s fast-paced tech world, where innovation moves at lightning speed, keeping systems secure is often overlooked until something goes wrong. This is where Zero Trust Architecture (ZTA) comes in—a modern approach that redefines how we think abo...29 readsDevops
Hari Prassad Kannanthe-it-spectrum.hashnode.dev·Oct 11, 2024"Never trust, always verify" - Understanding Zero TrustIntroduction In an era where cyber threats have become increasingly sophisticated, traditional security models that rely on static, perimeter-based defenses are no longer sufficient. The concept of Zero Trust emerged as a response to these growing c...11 likes·70 readszero-trust
linhbqforSRE Tribeblogs.sretribe.net·Oct 3, 2024Achieving Zero Trust Security on Amazon EKS with IstioThis is the fourth blog post of our “Istio on EKS” series. In this blog post, we’ll explore how Istio, a powerful service mesh, enables organizations to implement a zero trust security model on Amazon Elastic Kubernetes Service (Amazon EKS). We will ...zero
Saurabh Gerasaurabhgera.hashnode.dev·Sep 24, 2024**Saurabh Gera: A Technical Luminary in Healthcare Network, Security, and Cloud Architecture**Saurabh Gera stands as one of the brightest technical leaders in the healthcare industry, playing a pivotal role in transforming how healthcare enterprises approach network, security, and cloud architecture. As Principal Architect at UnitedHealth Gro...AI-driven security
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Zero Trust *ssh.ClientA few years ago, the OpenZiti project developed and published two client tools to make ssh and scp available over an OpenZiti overlay network without requiring the sshd port to be exposed to the internet. If interested, read the original posts about ...3 likes·3.1K readsZitifying Prometheuszero-trust
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Multifactor Zero Trust sshThe previous post revisited the zssh project and demonstrated how to implement a simple ssh client using the extended modules provided by the Golang project. It also modified that simple program and showed what it takes to incorporate OpenZiti, creat...632 readszero-trust