Zero Trust: Moving from perimeter security to API layer, continuous authentication

Francois Lascelles

Zero trust API layer

*Republished with permission from VMblog.com.

Traditionally, Zero Trust has been focused on moving beyond the network perimeter. But with the growing use of APIs, Zero Trust is increasingly about API security. VPN-based solutions to Zero Trust security challenges

Previous Video
Whiteboard Chats | API Security with Amplify
Whiteboard Chats | API Security with Amplify

Whiteboard chat explaining why API security matters and how Amplify plays a central role in enabling API Se...

Next Article
No one likes a leaky API: security requires a combination of technology & processes
No one likes a leaky API: security requires a combination of technology & processes

Not long ago, Peloton — the well-known manufacturer of high-end exercise equipment — experienced an unfortu...