How are you all securing networks and websites?

Meshach Cisero
2 replies
My colleague wrote an interesting article on the approach on implementing ZTNA? https://www.banyansecurity.io/blog/a-practical-approach-to-replacing-vpns-with-zero-trust-access/?utm_medium=producthunt&utm_source=producthunt&utm_campaign=ForumAmp&utm_content=producthunt

Replies

Kate Middle
VPN usually. I always turn on VPN when working with data. It's also convenient when need to find some info out of your region, so I even use it with my firestick. I use Express vpn, btw, https://www.firesticktricks.com/.... What VPN de you use? I'm also not sure about ZTNA, can you tell me how it works?
Migu Rico
VPN is a must-have today, no doubt. Use Vulners to make the system more secure. Vulners is a search engine for security intelligence, providing users with access to a comprehensive database of security-related information. It allows users to quickly search through a variety of sources, such as vulnerability databases, security advisories, and security news, to quickly find the information they need. The search engine provides users with detailed information, such as severity levels and technical details, allowing them to make informed decisions about security measures. Additionally, Vulners offers additional services, such as the ability to create custom alerts for specific security issues and stay up to date on the latest security threats. With its comprehensive database and numerous features and services, Vulners is an invaluable resource for keeping organizations secure https://vulners.com/search.