Forem

# zerotrust

Implementing and discussing the Zero Trust security model and architecture.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Shared Signals Framework: Bringing Standards to Continuous Session Protection
Cover image for Shared Signals Framework: Bringing Standards to Continuous Session Protection

Shared Signals Framework: Bringing Standards to Continuous Session Protection

1
Comments
5 min read
Why Zero Trust Is Failing Without Identity Governance

Why Zero Trust Is Failing Without Identity Governance

Comments
3 min read
We're Teaching AI Agents to Be Perfect Attackers

We're Teaching AI Agents to Be Perfect Attackers

Comments
6 min read
Building a Zero-Trust VPN: How I Wrapped OpenVPN and WireGuard with Modern Authentication

Building a Zero-Trust VPN: How I Wrapped OpenVPN and WireGuard with Modern Authentication

Comments
7 min read
Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame
Cover image for Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame

Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame

1
Comments 1
4 min read
Why Every Critical System Needs Multi-Party Authorization (Even If You're Not Building AI)
Cover image for Why Every Critical System Needs Multi-Party Authorization (Even If You're Not Building AI)

Why Every Critical System Needs Multi-Party Authorization (Even If You're Not Building AI)

Comments
5 min read
Designing Secure Azure Cloud Migrations Using Zero Trust and CIS Benchmarks

Designing Secure Azure Cloud Migrations Using Zero Trust and CIS Benchmarks

Comments
5 min read
Zero Trust Isn’t About Firewalls — It’s About Identity
Cover image for Zero Trust Isn’t About Firewalls — It’s About Identity

Zero Trust Isn’t About Firewalls — It’s About Identity

Comments
3 min read
Sophiax —Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

Sophiax —Detección de Intención: El fin de los ataques Evil Twin y el Ransomware mediante Blindaje Híbrido

1
Comments
4 min read
I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint
Cover image for I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

I Replaced 500 Lines of cert-manager Config With a 150-Line Blueprint

Comments
23 min read
Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing
Cover image for Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing

Zero Trust 2026: Has the Trust Boundary 'Vanished'? AI, ID-JAG, and Confidential Computing

Comments
6 min read
Zero Trust in 2025 Is Less About Vision, More About Friction
Cover image for Zero Trust in 2025 Is Less About Vision, More About Friction

Zero Trust in 2025 Is Less About Vision, More About Friction

1
Comments
5 min read
AI-to-AI Communication: Navigating the Risks in an Interconnected AI Ecosystem

AI-to-AI Communication: Navigating the Risks in an Interconnected AI Ecosystem

Comments 4
4 min read
The Silent Security Crisis: Why Your AI Systems Need Rejection Logging (And Most Don't Have It)
Cover image for The Silent Security Crisis: Why Your AI Systems Need Rejection Logging (And Most Don't Have It)

The Silent Security Crisis: Why Your AI Systems Need Rejection Logging (And Most Don't Have It)

Comments
4 min read
The Edge Security Paradox: How Zero Trust Architecture Created the Problems It Was Meant to Solve
Cover image for The Edge Security Paradox: How Zero Trust Architecture Created the Problems It Was Meant to Solve

The Edge Security Paradox: How Zero Trust Architecture Created the Problems It Was Meant to Solve

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.