top of page

ZER016
Blog
Did You Finish Your Training on Zinc Whiskers?
Today I stumbled across something that blew my mind, and I’ve been in IT long enough to think I’d seen some stuff. I was documenting some...
Jun 272 min read
The Browser Is the Perimeter Now
The Prisma Access Browser changes the way businesses think about secure access. Instead of tunneling traffic and relying on invasive SSL...
Jun 212 min read
Some Thoughts on DNS4EU
DNS4EU says it is about securing the most basic function of how the internet works. DNS translates the names of websites into IP...
Jun 193 min read
Useful Con References!
Conference Date(s) Location Link FutureCon Denver Cybersecurity Conference July 24, 2025 DoubleTree by Hilton Denver Tech Center (hybrid)...
Jun 181 min read
Stop Renewing Tech Debt: Why We Need to Let Go of Aging Hardware
Every year, companies pour thousands into extended support contracts, spare part stockpiles, and band-aid warranties for hardware that...
Jun 172 min read
Why DNS Control at the Perimeter Is Non-Negotiable
DNS is not just a lookup service. It is a fully functional, often completely exposed, communication channel that most enterprises still...
Jun 113 min read
Securing the Browser: Where Open Source Hits a Wall
The idea of an open source enterprise browser sounds appealing. Take the transparency and flexibility of open source, combine it with the...
Jun 102 min read
Using Traffic Logs to Build Dynamic Address Groups (DAGs) in PANW NGFW
Security teams are often reactive by nature alerts trigger responses, incidents trigger investigations. But buried in plain sight is an...
Jun 32 min read
bottom of page