{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Embracing Digital Transformation","title":"#178 Zero Trust networking with OpenZiti","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/8c780a1f\"></iframe>","width":"100%","height":180,"duration":2117,"description":"On this episode, Darren interviews Phillip Griffith, a community leader of the open-source project OpenZiti. They discuss the importance of Zero Trust networking in modern IT networks.# Unveiling the Dynamics of Zero Trust Networking and Overlay NetworksAs the digital age progresses, the conversation around network security takes a frontline position. In a rapidly evolving digital landscape, Zero-trust networking and Overlay networks are critical strategies for tackling current security challenges. Here, we delve into these concepts, how they shape our digital systems and provide an understanding of their potential benefits and applications.  A Closer Look at Zero Trust Networking Zero-trust networking is a mindset that places security as a prime concern in designing and operating digital systems. Its critical aspect is the presumption of potential threats from every part of the network, irrespective of how secure they may appear. This approach moves away from the traditional fortress-style concept in security and leads to more robust networks that do not rely solely on a single firewall's protection. Firstly, the beauty of zero-trust networks lies in their capacity to work effectively and securely, presenting an advantage for software developers and engineers. Security becomes an enabler rather than a hindrance to the software development process. With zero-trust networking, developers can focus on feature development without worrying about blocked ports or consulting network teams—a significant step towards faster market releases. Nevertheless, zero-trust networking doesn’t eliminate the need for perimeter defenses or firewalls. The zero trust strategy assumes a possible network compromise; therefore, it calls for defense layering instead of solely relying on elementary perimeter defense.  The Rise of Overlay Networks Amid the rising security threats and data breaches, overlay networks are emerging as an invaluable tool. These software-defined virtual networks...","thumbnail_url":"https://img.transistorcdn.com/IRrW2aizIeoZDn3gKLEax-JYQ8V_WzaFpHdgsslDx3k/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jM2Ji/MDk1OTdiYzA4ZWMw/NWNlOTY0N2RhMWQ3/YmY5Mi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}