// Topic
Zero Trust
Definition
Zero Trust coverage in this archive spans 5 posts from Feb 2018 to Mar 2026 and frames zero trust as continuous risk reduction instead of one-time policy work. The strongest adjacent threads are networking, security, and architecture. Recurring title motifs include ai, zero, trust, and architecture.
Working claims
- The strongest pattern is operational: security controls are effective only when they are embedded in delivery flow.
- The consistent theme from 2018 to 2026 is disciplined execution over hype cycles.
- This topic repeatedly intersects with networking, security, and architecture, so design choices here rarely stand alone.
How to apply this
- Map threats to concrete controls, then tie each control to an owner and an observable signal.
- Start with the newest post to calibrate current constraints, then backtrack to older entries for first principles.
- When boundary questions appear, cross-read networking and security before committing implementation details.
Where teams get burned
- Treating compliance checklists as a substitute for runtime detection and response.
- Adding controls no one owns, tests, or rehearses under incident pressure.
- Applying guidance from 2018 to 2026 without revisiting assumptions as context changed.
Suggested reading path
- Start here (current state): AI Agent Operations and the Networking Bottleneck: Why AI Agents Fail on Legacy Infrastructure
- Then read (operating middle): Your VPN Is a Liability. Here’s What Replaces It.
- Finish with (foundational context): Zero Trust Is Not a Product. Here’s How We Actually Built It.
Related posts
- AI Agent Operations and the Networking Bottleneck: Why AI Agents Fail on Legacy Infrastructure
- Zero Trust Architecture: What It Actually Looks Like
- Your VPN Is a Liability. Here’s What Replaces It.
- Your VPN Was Never a Security Architecture
- Zero Trust Is Not a Product. Here’s How We Actually Built It.
References
5 posts
- AI Agent Operations and the Networking Bottleneck: Why AI Agents Fail on Legacy Infrastructure
Most AI agent failures are infrastructure failures, not model failures. Legacy networking, flat trust boundaries, and missing circuit breakers are the real reliability bottleneck.
Zero Trust Architecture: What It Actually Looks Like
Zero trust from two perspectives: my NATO background in defense systems and work at a major telecom. The architecture patterns, the implementation path, and what most companies get wrong.
Your VPN Is a Liability. Here's What Replaces It.
VPNs trust the network. Zero trust trusts nothing. After years in NATO cyber defense and building infrastructure at Decloud, I've watched the perimeter model collapse in real time. Here's how to actually migrate.
Your VPN Was Never a Security Architecture
COVID broke everyone's VPN. Good. It was a terrible security model to begin with. The answer isn't scaling your VPN — it's replacing the mental model entirely.
Zero Trust Is Not a Product. Here's How We Actually Built It.
Perimeter security is dead. At the fintech startup, I ripped out the castle-and-moat model and replaced it with zero trust — identity-first, micro-segmented, no implicit trust anywhere. Here's what that actually looked like.