article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. Building endless aisle architecture for order processing Check it out! #9: Architecture flow for Microservices to simulate a realistic failure scenario Check it out! #6: 6: Let’s Architect! Figure 5. #5:

article thumbnail

Volunteers Wanted: Help SIA Develop New Architectural Graphics Standard

Security Industry Association

The Security Industry Association (SIA) Architectural Graphics Working Group invites interested volunteers to participate in the development of a fully updated version of the SIA AG-01 standard. Interested volunteers are encouraged to attend the meeting and join the Architectural Graphics Working Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A beginner’s guide to implementing zero-trust architecture

Online Computers

This is why, regardless of the size of your business, you need to beef up your cybersecurity, and the best way to do so is to implement a zero-trust security architecture. What is zero-trust architecture? According to him, trust is a security vulnerability and verification is a security necessity.

article thumbnail

Diving deep into Citrix zero trust architecture

Citrix

In my previous blog post , I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this post, I’ll dive deeper into the components that make … The post Diving deep into Citrix zero trust architecture first appeared on Citrix Blogs.

article thumbnail

What to know about zero trust architectures

Citrix

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. Related Stories How to implement zero trust security for your network How to create a zero trust network It’s time to stop using consumer browsers for work.

article thumbnail

Zero trust architecture benefits for your business

Citrix

But in reality, there’s no telling how or when a malicious actor might … The post Zero trust architecture benefits for your business first appeared on Citrix Blogs. Related Stories Seven principles of the zero trust security model Why should you evolve your multi-factor authentication to adaptive authentication?

article thumbnail

How to Achieve IT Agility: It’s All About Architecture

Pure Storage

How to Achieve IT Agility: It’s All About Architecture by Pure Storage Blog In our conversations with business and IT leaders, one overarching theme comes up again and again: “How can your company help me achieve my tactical and strategic IT goals, without straining my budget and resources?” The result is the antithesis of IT agility.