Kubernetes Threat Modeling

Kubernetes Threat Modeling Every security team has to deal with one question: “Are my services/deployments secure?” Answering this is non-trivial, and involves understanding the threat vectors faced by the services....

Kubernetes Workload Identity

Kubernetes Workload Identity Applications talk to each other, more often than anything else, to get the work done. Applications/Microservices typically have a fixed pattern of communication, for e.g, a backend...

Delivering Zero Trust in a DevSecOps model

Delivering Zero Trust in a DevSecOps model Several recent events have made Zero Trust security a mandate for companies, governments, and non-profits. The US Government has taken a decisive leadership...

Going from Zero to Zero Trust Security

Going from Zero to Zero Trust Security Several recent events have made Zero Trust security a mandate for companies, governments, and non-profits. The US Government has taken a decisive leadership...

McKinsey the Maven has spoken and…

McKinsey the Maven has spoken and… “Security as code: The best (and maybe only) path to securing cloud applications” Welcome to Zero Trust Data Security! Nat Natraj “Managing security as...

Data is the New Oil

Data is the New Oil Data is new oil Don’t let it become your Plutonium, Welcome to Zero Trust Data Security! I presume you were shocked by Amazon’s fine of $888M for...

Identity is the New Perimeter

Identity is the New Perimeter The perimeter is porous.. identity is the new perimeter The last few years has seen a tectonic shift in the velocity and sophistication of software...