Beatrisu fromhelujigokunointan.hashnode.dev·Dec 17, 2024Time’s Up! Expiration Dates Arrive for SharePoint Online LinksSharePoint Online has leveled up with a feature we’ve all secretly wanted: sharing links that don’t last forever. Whether you’re handing out a link for everyone in the company or just your favorite coworker, you can now slap an expiration date on it ...SharePoint
Marvellous Kalucyberwriter.hashnode.dev·Dec 2, 2024Understanding Zero Trust Architecture as the Future of Modern CybersecurityIn previous years, companies only focused on perimeter security, which comprises firewalls, VPNs, and intrusion detection systems to secure the network boundaries and prevent unauthorized access to those outside the network. With cyberattacks becomin...1 likezero-trust
La Rebelion Labsrebelion.la·Oct 18, 2024Kubernetes Anti-Patterns in Airgap EnvironmentsOperating Kubernetes in an airgap environment presents unique challenges that can easily lead to anti-patterns, inefficient practices that hinder productivity and security. Whether it is managing container images or handling security updates, these i...26 readsK1sairgap
Pranav Bawgikarpranavbawg.hashnode.dev·Oct 8, 2024My hot take on Zero-Knowledge Proofs[20] ZKPs are one of the most powerful tools cryptographers have ever devised, but unfortunately they are relatively poorly understood. I have been studying ZKPs and their uses and, although I am not an expert in them, I thought I would share what I ...ZKP
Curt TudorforOpenZiti Tech Blogblog.openziti.io·Oct 3, 2024The safest way to make Portainer Internet accessibleIf you run Portainer, and you seek a modern, flexible recipe for how to make it secure while also providing flexible access to your authorized users, this article is for you. A question that sometimes gets asked is: What types of companies, self-host...521 readsBrowZerziti
Sanket Nimkarsanketnmkr.hashnode.dev·Sep 16, 2024Implementing Zero Trust Architecture on AWS: Best Practices for Enhanced SecurityIn today’s IT world, traditional security methods are no longer enough. With more people working remotely, the rise of cloud computing, and increasingly clever cyber threats, we need a stronger way to protect our systems and data. That’s where Zero T...#ZTA
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Multifactor Zero Trust sshThe previous post revisited the zssh project and demonstrated how to implement a simple ssh client using the extended modules provided by the Golang project. It also modified that simple program and showed what it takes to incorporate OpenZiti, creat...475 readszero-trust
Abhiramcloudbuddy.hashnode.dev·Sep 6, 2024Zero Trust for Critical Infrastructure: A Comprehensive GuideCritical infrastructure, such as power plants, water treatment facilities, and transportation networks, is essential for the functioning of modern societies. However, these systems are increasingly vulnerable to cyberattacks, making it imperative to ...zero trust security
Sebastian Goscinskisebiweise.hashnode.dev·Aug 30, 2024Zero Trust Architecture: Enhancing Your Network SecurityIn today's ever-evolving threat landscape, traditional perimeter-based security models are no longer sufficient. Cyber threats are becoming more sophisticated, and breaches can occur even within trusted networks. This is where Zero Trust Architecture...1 likezerotrust
Chaithrachai005.hashnode.dev·Aug 26, 2024"The Ultimate MFA Implementation Guide: Enhancing Security with MFA in a Zero Trust NetworkMulti-Factor Authentication (MFA): Adding Layers of Security While passwordless authentication offers a substantial improvement over traditional methods, combining it with MFA further strengthens security. MFA requires users to provide two or more ve...MFA