[go: up one dir, main page]

Forem

# zerotrust

Implementing and discussing the Zero Trust security model and architecture.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security
Cover image for The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

Comments
5 min read
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

Comments
3 min read
How to Build an Enterprise Browser
Cover image for How to Build an Enterprise Browser

How to Build an Enterprise Browser

Comments
6 min read
Shared Signals Framework: Bringing Standards to Continuous Session Protection
Cover image for Shared Signals Framework: Bringing Standards to Continuous Session Protection

Shared Signals Framework: Bringing Standards to Continuous Session Protection

1
Comments
5 min read
Why Zero Trust Is Failing Without Identity Governance

Why Zero Trust Is Failing Without Identity Governance

Comments
3 min read
We're Teaching AI Agents to Be Perfect Attackers

We're Teaching AI Agents to Be Perfect Attackers

Comments
6 min read
Building a Zero-Trust VPN: How I Wrapped OpenVPN and WireGuard with Modern Authentication

Building a Zero-Trust VPN: How I Wrapped OpenVPN and WireGuard with Modern Authentication

Comments
7 min read
Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame
Cover image for Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame

Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame

1
Comments 1
4 min read
Why Every Critical System Needs Multi-Party Authorization (Even If You're Not Building AI)
Cover image for Why Every Critical System Needs Multi-Party Authorization (Even If You're Not Building AI)

Why Every Critical System Needs Multi-Party Authorization (Even If You're Not Building AI)

Comments
5 min read
Designing Secure Azure Cloud Migrations Using Zero Trust and CIS Benchmarks

Designing Secure Azure Cloud Migrations Using Zero Trust and CIS Benchmarks

Comments
5 min read
Zero Trust Isn’t About Firewalls — It’s About Identity
Cover image for Zero Trust Isn’t About Firewalls — It’s About Identity

Zero Trust Isn’t About Firewalls — It’s About Identity

Comments
3 min read
Sophiax —Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

Sophiax —Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

1
Comments
4 min read
I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint
Cover image for I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

Comments
23 min read
Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing
Cover image for Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing

Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing

Comments
6 min read
Zero Trust in 2025 Is Less About Vision, More About Friction
Cover image for Zero Trust in 2025 Is Less About Vision, More About Friction

Zero Trust in 2025 Is Less About Vision, More About Friction

1
Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.