BeyondCorp (2014)
Google's BeyondCorp approach rethinks enterprise security by moving away from traditional perimeter security to enhance protection in the changing tech environment. Visit the link for more details on this innovative strategy.
Read original articleThe article discusses Google's BeyondCorp approach to enterprise security, highlighting the shift away from traditional perimeter security enforced by firewalls. With the increasing adoption of mobile and cloud technologies, the conventional security model faces challenges when the perimeter is breached, granting attackers access to the company's privileged intranet. Google's alternative security strategy involves eliminating the need for a privileged intranet and transitioning corporate applications to the Internet. This new approach aims to enhance security in the evolving technological landscape. For further information, readers are directed to the provided link for additional details on BeyondCorp.
Related
The hacking of culture and the creation of socio-technical debt
Algorithms shape culture, dividing it into niche groups. "A Hacker Manifesto" by McKenzie Wark discusses hackers' influence on power dynamics, emphasizing free information. Tech giants like Facebook and TikTok wield immense cultural influence, blurring propaganda and personalization boundaries. Corporate dominance in culture hacking alters global power structures, challenging governments' regulatory capacity.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
VPN by Google One shuts down
Google One has discontinued its VPN service due to low usage. Existing Pixel owners retain access to a limited Pixel VPN. Google Fi Wireless subscribers can still use a VPN service. Users should delete the now-defunct VPN app from their devices.
Microsoft admits no guarantee of sovereignty for UK policing data
Microsoft admits inability to guarantee UK policing data sovereignty on its public cloud, potentially breaching UK data protection laws. Concerns persist despite company's efforts to address issues, impacting all UK government users.
The Death of the Web
The internet's evolution from creative individual websites to commercial dominance is discussed. Optimism for global unity and knowledge sharing shifted to profit-driven strategies, concentrating traffic on major platforms, altering user experience.
Open Source applications include:
- https://landing.openziti.io/
- https://www.ory.sh/oathkeeper/
Any other important projects I am missing?
Then when I started programming I realized we can’t trust programmers to do anything safely. And I wanted to airgap everything, but ofcourse that’s ridiculous.
So while we should assume all endpoints are open to the internet, I don’t think we should actually let them be. That would be madness.
does anyone expect every printer and network managed light fixture to stay up to date and vulnerability free? Even if it does, do we trust the vendors to not start spying on their customers?
I suspect this was mostly about selling the enterprise on saas/the cloud/google office. And it worked.
Related
The hacking of culture and the creation of socio-technical debt
Algorithms shape culture, dividing it into niche groups. "A Hacker Manifesto" by McKenzie Wark discusses hackers' influence on power dynamics, emphasizing free information. Tech giants like Facebook and TikTok wield immense cultural influence, blurring propaganda and personalization boundaries. Corporate dominance in culture hacking alters global power structures, challenging governments' regulatory capacity.
Simple ways to find exposed sensitive information
Various methods to find exposed sensitive information are discussed, including search engine dorking, Github searches, and PublicWWW for hardcoded API keys. Risks of misconfigured AWS S3 buckets are highlighted, stressing data confidentiality.
VPN by Google One shuts down
Google One has discontinued its VPN service due to low usage. Existing Pixel owners retain access to a limited Pixel VPN. Google Fi Wireless subscribers can still use a VPN service. Users should delete the now-defunct VPN app from their devices.
Microsoft admits no guarantee of sovereignty for UK policing data
Microsoft admits inability to guarantee UK policing data sovereignty on its public cloud, potentially breaching UK data protection laws. Concerns persist despite company's efforts to address issues, impacting all UK government users.
The Death of the Web
The internet's evolution from creative individual websites to commercial dominance is discussed. Optimism for global unity and knowledge sharing shifted to profit-driven strategies, concentrating traffic on major platforms, altering user experience.