InInfoSec Write-upsbyTide FoundationReimagining cybersecurity for platform developersCybersecurity is broken. Let’s fix it!Oct 252
AKZero Trust API Security: Building Bulletproof API Gateways for Modern ApplicationsDuring my years securing APIs for fintech and healthcare companies, I’ve learned that traditional perimeter-based security is no longer…3d ago13d ago1
Steve JonesZero-Trust LLMsWhy feature flags and delegated authority need to exist in GenAI’s futureJan 241Jan 241
Sven van GinkelSelf-hosting securely with Cloudflare Zero Trust TunnelsIn the age of self-hosting, ensuring secure and reliable access to your server is crucial. Cloudflare Zero Trust offers a seamless…Aug 21Aug 21
InInfoSec Write-upsbyTide FoundationReimagining cybersecurity for platform developersCybersecurity is broken. Let’s fix it!Oct 252
AKZero Trust API Security: Building Bulletproof API Gateways for Modern ApplicationsDuring my years securing APIs for fintech and healthcare companies, I’ve learned that traditional perimeter-based security is no longer…3d ago1
Steve JonesZero-Trust LLMsWhy feature flags and delegated authority need to exist in GenAI’s futureJan 241
Sven van GinkelSelf-hosting securely with Cloudflare Zero Trust TunnelsIn the age of self-hosting, ensuring secure and reliable access to your server is crucial. Cloudflare Zero Trust offers a seamless…Aug 21
InAzure Cloud TechinicalbyNsethFundamentals of Microsoft zero trust architectureIn today’s world, traditional security models that rely solely on perimeter defenses are no longer sufficient. The rise of remote work…Nov 4
InITNEXTbyBoris ZaikinFrom Zero Trust to AI Integration — Innovations in Safeguarding Sensitive InformationBy implementing effective secrets management, organizations can reduce risk, improve operational efficiency, and respond to incidents more…3d ago