La Rebelion Labsrebelion.la·Oct 18, 2024Kubernetes Anti-Patterns in Airgap EnvironmentsOperating Kubernetes in an airgap environment presents unique challenges that can easily lead to anti-patterns, inefficient practices that hinder productivity and security. Whether it is managing container images or handling security updates, these i...DiscussK1sairgap
Pranav Bawgikarpranavbawg.hashnode.dev·Oct 8, 2024My hot take on Zero-Knowledge Proofs[20] ZKPs are one of the most powerful tools cryptographers have ever devised, but unfortunately they are relatively poorly understood. I have been studying ZKPs and their uses and, although I am not an expert in them, I thought I would share what I ...DiscussZKP
Curt TudorforOpenZiti Tech Blogblog.openziti.io·Oct 3, 2024The safest way to make Portainer Internet accessibleIf you run Portainer, and you seek a modern, flexible recipe for how to make it secure while also providing flexible access to your authorized users, this article is for you. A question that sometimes gets asked is: What types of companies, self-host...Discuss·366 readsBrowZerziti
Sanket Nimkarsanketnmkr.hashnode.dev·Sep 16, 2024Implementing Zero Trust Architecture on AWS: Best Practices for Enhanced SecurityIn today’s IT world, traditional security methods are no longer enough. With more people working remotely, the rise of cloud computing, and increasingly clever cyber threats, we need a stronger way to protect our systems and data. That’s where Zero T...Discuss#ZTA
Clint DovholukforOpenZiti Tech Blogblog.openziti.io·Sep 9, 2024Multifactor Zero Trust sshThe previous post revisited the zssh project and demonstrated how to implement a simple ssh client using the extended modules provided by the Golang project. It also modified that simple program and showed what it takes to incorporate OpenZiti, creat...Discuss·389 readszero-trust
Abhiramcloudbuddy.hashnode.dev·Sep 6, 2024Zero Trust for Critical Infrastructure: A Comprehensive GuideCritical infrastructure, such as power plants, water treatment facilities, and transportation networks, is essential for the functioning of modern societies. However, these systems are increasingly vulnerable to cyberattacks, making it imperative to ...Discusszero trust security
Sebastian Goscinskisebiweise.hashnode.dev·Aug 30, 2024Zero Trust Architecture: Enhancing Your Network SecurityIn today's ever-evolving threat landscape, traditional perimeter-based security models are no longer sufficient. Cyber threats are becoming more sophisticated, and breaches can occur even within trusted networks. This is where Zero Trust Architecture...Discuss·1 likezerotrust
Chaithrachai005.hashnode.dev·Aug 26, 2024"The Ultimate MFA Implementation Guide: Enhancing Security with MFA in a Zero Trust NetworkMulti-Factor Authentication (MFA): Adding Layers of Security While passwordless authentication offers a substantial improvement over traditional methods, combining it with MFA further strengthens security. MFA requires users to provide two or more ve...DiscussMFA
Kanglin Wukanglin.hashnode.dev·Aug 16, 2024A Powerful Feature in Cloudflare Access You Shouldn't MissBackground 這陣子接手了 WordPress 的專案,該專案有使用到 Cloudflare 的服務,在交接的過程中,發現之前的管理員使用的 Cloudflare Access 裡的功能,可以將 WordPress 裡的 wp-login.php 用很簡易的方式開啟 Email 兩段式驗證。 How 跟著下列任一方式進入 Zero Trust 在個別的 Websites 頁面上,點選左側欄位裡的 Access 後,中間主頁會出現 Launch Zero Trust 的 Button。...Discusscloudflare
La Rebelion Labsrebelion.la·Jul 12, 2024How to Install Kubernetes in Airgapped Environments (Without a Container Runtime!)Air-gapped environments and zero-trust networks are becoming essential in finance, health, and telecommunications sectors. These security measures ensure data integrity and protect against cyber threats. One of my blog posts on installing Kubernetes ...Discuss·87 readsK1sKubernetes