DEV Community

# zerotrust

Implementing and discussing the Zero Trust security model and architecture.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Zero-Trust for AI Agents: The Critical Blind Spot in Enterprise Security

Zero-Trust for AI Agents: The Critical Blind Spot in Enterprise Security

Comments
8 min read
Zero Trust: A Strategy, Not a Product

Zero Trust: A Strategy, Not a Product

Comments
15 min read
Zero-Trust Architecture for AI Agents: Why Your Current Setup Is Probably Wrong

Zero-Trust Architecture for AI Agents: Why Your Current Setup Is Probably Wrong

1
Comments
6 min read
Zero-Trust Identity Verification: Detecting Insider Threats Before They Exfiltrate Data

Zero-Trust Identity Verification: Detecting Insider Threats Before They Exfiltrate Data

1
Comments
5 min read
Zero-Trust Architecture in Practice: Why Perimeter Security Failed and What Actually Works

Zero-Trust Architecture in Practice: Why Perimeter Security Failed and What Actually Works

1
Comments
11 min read
Zero-Trust Architecture in Practice: Real-World Implementation Steps

Zero-Trust Architecture in Practice: Real-World Implementation Steps

Comments
4 min read
Zero-Trust at the Edge: Rethinking the eDMZ Perimeter (Part 1)

Zero-Trust at the Edge: Rethinking the eDMZ Perimeter (Part 1)

1
Comments
6 min read
Identity-First Security Strategy

Identity-First Security Strategy

1
Comments
4 min read
The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

Comments
5 min read
The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

The Fragility of Modern DevOps: A 2026 CI/CD Exposure Report

Comments
3 min read
Shared Signals Framework: Bringing Standards to Continuous Session Protection

Shared Signals Framework: Bringing Standards to Continuous Session Protection

1
Comments
5 min read
We're Teaching AI Agents to Be Perfect Attackers

We're Teaching AI Agents to Be Perfect Attackers

Comments
6 min read
How to Build an Enterprise Browser

How to Build an Enterprise Browser

1
Comments
5 min read
Building a Zero-Trust VPN: How I Wrapped OpenVPN and WireGuard with Modern Authentication

Building a Zero-Trust VPN: How I Wrapped OpenVPN and WireGuard with Modern Authentication

Comments
7 min read
Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame

Securing Legacy Java Monoliths with Runtime Zero-Trust: My Open-Source Framework LingFrame

1
Comments 1
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.