Pradeep Kurapatipradeepkurapati.hashnode.dev·Sep 20, 2023Zero Trust in KubernetesIntroduction A typical enterprise changed in so many ways. This evolution, while presented many benefits, also made legacy technologies incompatible in modern technological landscape. Gone are the days when we can clearly define a perimeter within wh...Discuss·1 likeKubernetes SecurityKubernetes
Nee4pfsec.com·Aug 28, 2023Twingate: The Future of Remote AccessIntroduction Twingate is a cloud-based service that provides secured remote access to an organization’s networks. It’s function is very similar to a business VPN. Twingate makes Zero Trust Network Access (Yes, Buzzword. I know) easy to deploy, even e...Discuss·105 readszerotrust
Michael QuigleyforOpenZiti Tech Blogblog.openziti.io·Aug 23, 2023The zrok SDKHopefully, you're already familiar with zrok, our open-source solution for easy and secure sharing. If you're not, check out the initial post introducing zrok. There's also a more recent post describing some of the new features in the latest v0.4.0 v...Discuss·2 likes·1.1K readszrok
Michael QuigleyforOpenZiti Tech Blogblog.openziti.io·Jul 25, 2023Announcing the zrok Public Beta!zrok is officially in public beta. Feel free to download the latest release of zrok and invite yourself to the public instance using the zrok invite command (there is no longer an invite token requirement): $ zrok invite enter and confirm your emai...Discuss·11 likes·687 readszrok
Prasnjit Kumar sharmareadhook.hashnode.dev·Jul 13, 2023Core Concepts of Zero TrustZero Trust is a modern security framework that addresses the ever-evolving threat landscape in the digital world. It emphasizes the idea of “never trust, always verify”. This approach requires organizations to abandon the traditional perimeter-based ...Discusszerotrust
Amit Himaniblog.knowledge-cafe.dev·Jun 11, 2023Spring MVC With SSL for Secure CommunicationNormally, when someone logs into a network, we assume they’re trustworthy. But with zero trust security, we’re more cautious. We check and verify every user, device, and application, no matter where they’re located or what network they’re using. This...DiscussSpringboot
Sven BergendahlProsvenbergendahl.com·Apr 25, 2023Easy Mode: What is Zero Trust?Hey there! Welcome to the first blog of my "Easy Mode" series, where I break down complex topics into bite-sized, easy-to-understand posts. Today, we're going to dive into a cybersecurity concept called Zero Trust. Imagine a world where you question ...Discuss·56 readsEasy Modezerotrust
Lloyd Mckieblog.mckie.info·Apr 19, 2023Bob, AI Alice and MalloryLet's set the stage Bob is a Developer at a company. Bob has a new project on setting up IPv6 Networking which he's not familiar with. He wants to use the new Alice AI which he's heard so much about. However, he's not sure how much to share with Alic...Discuss·67 readsgenerative ai
Michael QuigleyforOpenZiti Tech Blogblog.openziti.io·Feb 22, 2023The Road Ahead for zrokIf you're not sure what zrok is, see our blog post introducing zrok. Now that v0.3 has been released the zrok team is spending time collecting feedback and building our roadmap for what's coming next in v0.4. As always, our project board on Github i...Discuss·1 like·756 readszrok
Carl HandyforKalpa Services Inc.kalpa.hashnode.dev·Jan 24, 2023Unlock the Benefits of Zero Trust: A Comprehensive Comparison to VPNsIn today's digital world, security is of the utmost importance. As more and more data is stored online, organizations need to ensure that their networks are secure from malicious actors. One way to do this is through a virtual private network (VPN). ...Discuss·80 readszerotrust