<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>zero trust on Referently.com</title>
    <link>https://referently.com/tags/zero-trust/</link>
    <description>Recent content in zero trust on Referently.com</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 25 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://referently.com/tags/zero-trust/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Trust Nothing, Verify Everything, Repeat</title>
      <link>https://referently.com/trust-nothing-verify-everything-repeat/</link>
      <pubDate>Wed, 25 Mar 2026 00:00:00 +0000</pubDate>
      
      <guid>https://referently.com/trust-nothing-verify-everything-repeat/</guid>
      <description>Zero trust begins with a kind of uncomfortable admission: the network is no longer a safe boundary. For years, security was built around the idea that once you were “inside,” you were mostly trusted. Firewalls guarded the perimeter, and anything beyond that line operated with fewer questions asked. That model made sense when systems were centralized and users sat in predictable locations. It doesn’t hold up anymore. Work happens across cloud platforms, personal devices, remote connections, third-party integrations—there isn’t a clean inside or outside anymore, just a constantly shifting surface of interactions.</description>
    </item>
    
  </channel>
</rss>
