Operations | Monitoring | ITSM | DevOps | Cloud

Zero Trust

How Are Cloud VPNs the Backbone of Secure Remote Access?

At a time when remote work and cloud-based solutions are shaping the business world, secure access to data has become essential. Cloud VPNs (Virtual Private Networks) are central to this process, offering secure, scalable, and efficient solutions for remote access. Unlike traditional VPNs, which operate on-premises, Cloud VPNs integrate directly with cloud environments, making them indispensable for modern organizations reliant on cloud infrastructures and remote workforces.

NIST and the Evolution of Zero Trust

It’s important for every cybersecurity professional to understand the work of the National Institute of Standards and Technology (NIST). That’s because it plays a pivotal role in shaping the cybersecurity landscape, particularly through its groundbreaking NIST zero trust efforts. Zero trust is a security paradigm that transforms the traditional approach to network security.

Open source cybersecurity: Zero trust and confidential computing

What is the Zero Trust model in Cybersecurity? Watch the video as Ijlal Loutfi, Product Manager at Canonical, explains what Zero Trust is and why confidential computing is essential to safeguard systems against cyber attacks and vulnerabilities. Ijlal also discusses the technology that allows AI workloads to run in a confidential way. Stay tuned to our social media pages as we share educational materials to help your organizations stay secure this Month.

How to Achieve Zero Trust Adoption in U.S. Government

Zero Trust adoption is critical, especially for U.S. government agencies. With changing policies and requirements, it can be tough to stay ahead of everything you need to know. We’ll provide a high-level overview of Zero Trust adoption + share how automation can help you achieve compliance.

5 Steps to getting started with Zero Trust

In the previous two blogs, we’ve traced the outline of Zero Trust from philosophy and principles to frameworks and marketing terms. In this blog Pete Roythorne talked to Marc Barry, Co-Founder and Chief Product Officer at Enclave, about how you can get started with Zero Trust Network Access. You can read the previous blogs here: To do this we’re going to use CISA’s Zero Trust Maturity Model as a baseline for understanding.

Zero-Trust mTLS Automation with HAProxy and SPIFFE/SPIRE

Whether you’re running a service mesh composed of HAProxy instances or facilitating communication between multiple systems, ensuring the authentication of traffic between your services is critical. This zero-trust security model operates under the assumption that you should not extend trust without verification, even within your own systems. By verifying every interaction, you mitigate the risks that arise when third parties imitate your systems.

SDP and Zero Trust: The Dynamic Duo for Application Security

Until relatively recently, enterprises relied on fixed perimeters using firewalls and VPNs to control access to networks and resources. Traditional network security assumed that everything within the network could be trusted, while external users were granted access with simple password protection.

Zero Trust Pipelines with OIDC, Cloudsmith, and GitHub Actions

In CI/CD workflows, leaked credentials pose a significant threat, potentially leading to unauthorized access, data breaches, and system compromises, ultimately disrupting development pipelines and undermining the integrity of software deployment processes.

Integrating Zero Trust Access (ZTA), Secure Web Gateway (SWG) & Cloud Access Security Broker (CASB)

Ivanti’s Steven Beuving breaks down the components that make up a holistic SSE solution – integrating ZTA, SWG, and CASB – all in pursuit of a modern approach to today’s security risks. Ivanti finds, heals, and protects every device, everywhere – automatically. Whether your team is down the hall or spread around the globe, Ivanti makes it easy and secure for them to do what they do best. Ivanti is IT for the way we work now. Integrated solutions for everything IT touches. So, employees can work better, anywhere, and everywhere.