Blog
A content orchestrator series for the modern technical writer At NetFoundry, we’re building the foundational architecture for zero-trust networking with OpenZiti (our programmable zero-trust overlay)....
Recently I had the chance to speak at the 4th Annual DoW Zero Trust Learning Exchange, a collaboration between ATARC, DAU and...
If you’re running multiple LLM providers and want a single API in front of them, you have options. This post compares open...
Why Digital Transformation Left OT’s Traditional “Broken” Networking in the Dust NetFoundry CEO Galeal Zino was recently interviewed by Larry O’Brien, VP...
Why Every DevOps Engineer Should Be Using Ziti Velocity vs security – why can we not have both? After working in the...
The Power of Dark Services with OpenZiti The recent OpenClaw vulnerabilities sent ripples through the cybersecurity community. Research from the SecurityScorecard STRIKE...
Jarvis or WannaCry, will the real OpenClaw please stand up? OpenClaw (FKA Clawdbot before legal pressure) broke the Internet. And it is...
In an era where digital operations define business success, companies need more than just connectivity—they need secure, controlled, and trusted connectivity. This...
As platform engineers, we are currently stuck between a rock and a hard place. Our internal developers want frictionless access to frontier...
After backpacking Sumatra for 28 grueling days, completely cut off from the rest of civilization, I arrived in Jakarta, Indonesia. There was a...
Simple, secure OT connectivity…without additional installs This may sound like magic, but it is true. Simple, secure OT connectivity, without installing additional...
At DEF CON 33 (Las Vegas, August 7-10, 2025), AmberWolf researchers disclosed critical vulnerabilities in major ZTNA (Zero Trust Network Access) products...