Zero Trust Architecture: What It Actually Looks Like
Zero trust from two perspectives: my NATO background in defense systems and work at a major telecom. The architecture patterns, the implementation path, and what most companies get wrong.
Networking coverage in this archive spans 5 posts from Sep 2016 to Mar 2026 and treats networking as a production discipline: evaluation loops, tool boundaries, escalation paths, and cost control. The strongest adjacent threads are zero trust, security, and vpn. Recurring title motifs include ai, networking, architecture, and agent.
Zero trust from two perspectives: my NATO background in defense systems and work at a major telecom. The architecture patterns, the implementation path, and what most companies get wrong.
VPNs trust the network. Zero trust trusts nothing. After years in NATO cyber defense and building infrastructure at Decloud, I've watched the perimeter model collapse in real time. Here's how to actually migrate.
COVID broke everyone's VPN. Good. It was a terrible security model to begin with. The answer isn't scaling your VPN — it's replacing the mental model entirely.
Too many developers treat the network as magic. It bites them in production every time.