
Before I start this article, I want to acknowledge and thank one of my blog readers for reaching out to me. On Tuesday, I received …
Guides and Designs for the Network Security Generalist
Before I start this article, I want to acknowledge and thank one of my blog readers for reaching out to me. On Tuesday, I received …
This post concludes the series on Zero Trust Network Access. This series has covered an overview of ZTNA, all the way to using endpoint posture …
In my previous post, I discussed how to access web application and non-web applications via the Zero Trust Network Access in the Fortinet solution. In …
Sometimes I take for granted how certain tasks are not well defined in official FortiManager documentation. I just recently I saw a post on Reddit …
In the previous blog post, I cover how the FortiGate provides secured access to web applications via its reverse proxy functionality in its Zero Trust …
In the previous blog post, I covered setting up the basis of security with Zero Trust Network Access (ZTNA) through establishing telemetry. In this post, …
In the previous posts I laid the foundation to explain how I am using Zero Trust Network Access (ZTNA) to solve my remote access problem …
In my previous post, I provided a brief overview of the importance of Zero Trust Network Access (ZTNA). Before I get into the nuts and …
Introduction I could think of no better way to kick off 2022 than talking about one of the hottest buzzwords in Cyber Security today. Zero …