Operations | Monitoring | ITSM | DevOps | Cloud

Visibility Is the First Line of Defense: Operational Readiness in a Zero Trust World

As global cyber threats continue to evolve at unprecedented speed, the United States public sector faces growing pressure to enhance operational readiness. Agencies must now contend with adversaries who are not only well-funded but also increasingly sophisticated in their ability to exploit visibility gaps. In the face of this dynamic threat landscape, the Zero Trust Architecture (ZTA) model has become an essential security framework.

Introducing ZTB - Defining Zero Trust for Bring Your Own Cloud (BYOC)

Isn’t the "Bring Your Own Cloud" (BYOC) model the latest hot topic in the evolution of cloud-native architecture, especially for companies offering cloud-hosted platforms that must be deployed in the customer’s cloud for privacy, control, or compliance reasons? Over the past few weeks, we have been rigorously researching and discussing how to build a secure BYOC model.

The Hidden Role of VLANs in Hybrid Cloud Security

Cloud security gets most of the attention these days, but what protects the connections underneath? Hybrid environments often rely on virtual bridges that go unnoticed. These hidden structures shape everything from access control to lateral movement. Virtual Local Area Networks (VLANs), while often overlooked, play a key role in securing communication across on-prem and cloud networks.

Extra Factor Authentication: how to create zero trust IAM with third-party IdPs

Identity management is vitally important in cybersecurity. Every time someone tries to access your networks, systems, or resources, it’s critical that you are verifying that these attempts are valid and legitimate, and that they match a real, authenticated user. The way that this tends to be handled in cyber security is through Identity and Access Management (IAM), most commonly by using third-party Identity Providers (IdPs).

Is Your Attack Surface Growing Faster Than Your Security?

In today's digital-first business environment, the race to adopt new technologies often outpaces the strategies to secure them. From cloud services to remote work tools, organizations are rapidly expanding their digital presence. However, with every new tool, platform, or endpoint comes a new potential vulnerability. This expanding "attack surface" can leave businesses exposed, especially if they don't actively monitor and manage it.

Demo Roundups! Zero Trust Security + Runbook Automation

The shift to zero trust security requires a model that is identity-based, centrally managed, widely encrypted, and always authenticated and authorized. PagerDuty Runbook Automation enables users to automate, orchestrate, and accelerate issue resolution with best practice security guardrails, reducing human error and saving time. Host: Sid Verma (Senior Developer Advocate at PagerDuty) Guests: Christopher Hills (Chief Security Strategist at BeyondTrust); Jake Cohen (Senior Product Manager at PagerDuty)

Moving to a zero-trust model with Kosli's custom attestations

The Kosli CLI provides several attest commands, such as kosli attest snyk, kosli attest jira, etc. These attestations are “typed” - each one knows how to interpret its own particular kind of input. For example, kosli attest snyk interprets the sarif file produced by a snyk container scan to determine the true/false value for that individual attestation.

How Are Cloud VPNs the Backbone of Secure Remote Access?

At a time when remote work and cloud-based solutions are shaping the business world, secure access to data has become essential. Cloud VPNs (Virtual Private Networks) are central to this process, offering secure, scalable, and efficient solutions for remote access. Unlike traditional VPNs, which operate on-premises, Cloud VPNs integrate directly with cloud environments, making them indispensable for modern organizations reliant on cloud infrastructures and remote workforces.

NIST and the Evolution of Zero Trust

It’s important for every cybersecurity professional to understand the work of the National Institute of Standards and Technology (NIST). That’s because it plays a pivotal role in shaping the cybersecurity landscape, particularly through its groundbreaking NIST zero trust efforts. Zero trust is a security paradigm that transforms the traditional approach to network security.

Open source cybersecurity: Zero trust and confidential computing

What is the Zero Trust model in Cybersecurity? Watch the video as Ijlal Loutfi, Product Manager at Canonical, explains what Zero Trust is and why confidential computing is essential to safeguard systems against cyber attacks and vulnerabilities. Ijlal also discusses the technology that allows AI workloads to run in a confidential way. Stay tuned to our social media pages as we share educational materials to help your organizations stay secure this Month.