-
**Is your feature request related to a problem? Please describe.**
There are a number of Zero Trust solutions (for instance, zscaler) that can ensure some degree of device security posture before all…
-
Hi!
I'm building [a free software project](https://gitlab.com/papiris/ml-predator-control-thesis) to offer predator alerts and deterrence for farms, using NVR and zero-trust, overlay mesh networkin…
ruzko updated
7 months ago
-
**"Never Trust, Always Verify"**
> 위의 내용은 제로트러스트를 구체적이고 명확하게 이해하는데 도움을 줍니다. 종종 제로트러스트를 이야기할 때 ‘모든 것을 신뢰하지 않는다. 아무도 믿지 않는다.’ 등과 같이 모호하게 언급하는 경우가 있습니다. 이러한 내용만으로는 실제 IT 환경에서 제로트러스트 보안 정책을 수립하거나 운용하는 …
-
Basically, Istio is a more advanced and feature-rich take on the traditional NetworkPolicy.
Features:
- Zero-trust by default.
- Layer 7 security (vs. NetworkPolicy layer 4 security).
- Securi…
-
https://kubescape.io/
Evaluate:
Community adoption
Chainguard/Ironbank support
Feature parity with NeuVector
Out of the box experience and alignment with deployment methodology (helm, config …
-
(This is early ideation to invite some early thinking/feedback - will evolve this into detailed RFC).
**Problem Statement**
Today security plugin authorization is primarily modeled around transp…
-
Survey Q1 + Starting thesis ```10 jan``` {job next to thesis}
Also interested in the problem of _online trust_. General intro and overview by Bruce {rockstar of security research} [Ten Risks of PKI…
-
Subsequent to #950, we intend to revise the process for producing a TAG Security whitepaper. Discussion is still ongoing about what improvements are needed or how the revision process will be executed…
-
Hello Community,
I currently have multiple Kubernetes clusters running with Istio versions 1.22 and 1.23. Istio is deployed in our clusters using the istiod Helm charts, and we are using the config…
-
Please note there is a new TF-A security advisory, describing the Arm Trusted Firmware exposure to a new variant 4 of the speculative processor vulnerabilities using cache timing side-channels:
htt…