HackerNews Readings
40,000 HackerNews book recommendations identified using NLP and deep learning

Scroll down for comments...

Ten Arguments for Deleting Your Social Media Accounts Right Now

Jaron Lanier

4.5 on Amazon

2 HN comments

Articulating Design Decisions: Communicate with Stakeholders, Keep Your Sanity, and Deliver the Best User Experience

Tom Greever

4.7 on Amazon

2 HN comments

Python for Finance: Mastering Data-Driven Finance

Yves Hilpisch

4.6 on Amazon

2 HN comments

Uncanny Valley: A Memoir

Anna Wiener

4 on Amazon

2 HN comments

The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics

Ben Buchanan

4.5 on Amazon

2 HN comments

Linux Pocket Guide: Essential Commands

Daniel J. Barrett

4.7 on Amazon

2 HN comments

Accounting For Dummies

John A. Tracy

4.4 on Amazon

2 HN comments

Crush It!: Why NOW Is the Time to Cash In on Your Passion

Gary Vaynerchuk and HarperAudio

4.6 on Amazon

2 HN comments

The Revolt of The Public and the Crisis of Authority in the New Millennium

Martin Gurri

4.5 on Amazon

2 HN comments

Making Work Visible: Exposing Time Theft to Optimize Work & flow

Dominica Degrandis, Erin Bennett, et al.

4.6 on Amazon

2 HN comments

Zero Trust Networks: Building Secure Systems in Untrusted Networks

Evan Gilman and Doug Barth

4.7 on Amazon

2 HN comments

Building a StoryBrand: Clarify Your Message So Customers Will Listen

Donald Miller and HarperCollins Leadership

4.7 on Amazon

1 HN comments

Marketing Made Simple: A Step-by-Step StoryBrand Guide for Any Business

Donald Miller, Dr. J.J. Peterson, et al.

4.8 on Amazon

1 HN comments

Deep Learning (Adaptive Computation and Machine Learning series)

Ian Goodfellow , Yoshua Bengio , et al.

4.4 on Amazon

1 HN comments

Don't Make Me Think, Revisited: A Common Sense Approach to Web Usability (3rd Edition) (Voices That Matter)

Steve Krug

4.6 on Amazon

1 HN comments

Prev Page 12/16 Next
Sorted by relevance

xvectoronJan 12, 2021

> I recall that many companies have switched from a perimeter model of defense where systems are secured from the outside to a "defense in depth" model where each system is secured on it's own (plus the perimeter).

Yes, this is the current bleeding edge of cloud security, known as “zero trust.” Amongst other things, it usually involves provisioning mTLS identities in a secured manner to each service, with connections restricted to a whitelisted set of identities.

I found Evan Gilman and Doug Barth’s “Zero Trust Networks: Building Secure Systems in Untrusted Networks” [1] a pretty helpful read in understanding what modern/next-gen cloud security looks like.

Some modern implementations of varying depth and scale include SPIRE [2], Tailscale [3], and BeyondCorp [4].

-—-

[1]: https://www.amazon.com/Zero-Trust-Networks-Building-Untruste...

[2]: https://spiffe.io/

[3]: https://tailscale.com/

[4]: https://beyondcorp.com/

Built withby tracyhenry

.

Follow me on