Open in app

Sign In

Write

Sign In

Mastodon
Greg Thomas
Greg Thomas

895 Followers

Home

Lists

About

Published in

HashiCorp Solutions Engineering Blog

·Pinned

Why You Should be Using an Identity-Aware Proxy (IAP)

How to Log in without a Virtual Private Network (VPN), Public IP address, or an SSH connection to any target machine Image Source: HashiCorp Digital warfare has early adopters, fast followers, and those left behind. Back in 1996, a Microsoft employee developed the PPTP. “The protocol created a more secure…

Zero Trust

6 min read

Why You Should be Using an Identity-Aware Proxy (IAP)
Why You Should be Using an Identity-Aware Proxy (IAP)
Zero Trust

6 min read


Published in

HashiCorp Solutions Engineering Blog

·Pinned

Why I Believe HCL is Better than YAML

Explore the differences between YAML and HCL. Audience: practitioners, security professionals, operations teams, and technical advisers Tags: Terraform, YAML, HashiCorp Language (HCL), Computing, Cloud, Cloud Operating Model, HashiCorp, Nomad, Kubernetes There are several ways to automate infrastructure. By now most developers are probably familiar with YAML and HCL. Some may…

Kubernetes

5 min read

Why I Believe HCL is Better than YAML
Why I Believe HCL is Better than YAML
Kubernetes

5 min read


Published in

HashiCorp Solutions Engineering Blog

·Jul 3

Industrialize infrastructure as code in Government and Industry

Terraform agents’ best practices for regulated industries By: Joshua Tracey, Resident Engineer, HashiCorp Federal, & Greg Thomas, Sr Solutions Engineer, HashiCorp Federal Recently, an interesting post by Defense Scoop announced that “Intelligence agencies (are) confronting challenges with multi-cloud environments.” Modern information technology (IT) abstracts infrastructure from physical hardware using logical constructs programmed in software. The challenge is…

Terraform

5 min read

Industrialize infrastructure as code in government and industry
Industrialize infrastructure as code in government and industry
Terraform

5 min read


Published in

HashiCorp Solutions Engineering Blog

·May 11

Infrastructure as code in government and regulated industries

Explore policy as code and security models for Terraforming Modern IT abstracts infrastructure from physical hardware using logical constructs programmed in software. This abstraction accelerates the shift from static, on-premises, physical IT infrastructure to logical, distributed, software-defined resources that can be provisioned and de-provisioned rapidly using infrastructure as code (IaC). IaC defines infrastructure in software configuration files, effectively codifying…

Terraform

7 min read

Infrastructure as code in government and regulated industries
Infrastructure as code in government and regulated industries
Terraform

7 min read


Published in

HashiCorp Solutions Engineering Blog

·Apr 6

Don’t make application security a network layer problem

Treating a network like it is already compromised is at the core of zero trust security. Knowing this, why are so many “secure” systems still taking a network-centric approach, relying mainly on their firewalls to protect them? In this article, we will examine why migrating to a service-based network architecture…

Zero Trust

6 min read

Don’t make application security a network layer problem
Don’t make application security a network layer problem
Zero Trust

6 min read


Mar 15

NSA Provides Guidance for ICAM

NSA Releases Recommendations for Maturing Identity, Credential, and Access Management in Zero Trust — The National Security Agency (NSA) has followed up on, Embracing a Zero Trust Security Model to assist system operators in maturing their identity and credential access management (ICAM) capabilities. Check out HashiCorp’s response to the initial model in a three-part series featured in the Intelligence Community News.

Zero Trust

3 min read

NSA Provides Guidance for ICAM
NSA Provides Guidance for ICAM
Zero Trust

3 min read


Published in

ILLUMINATION

·Jan 29

How the Hiring Our Heroes Program Helped me Transition from the U.S. Military to a Successful Career in the Tech Industry

My Personal Experience — The Challenge of Transitioning from the Military We can serve our family, community, or nation in many ways. One of the most difficult is the Military. Besides the hardships you endure in service, you will face a final challenge leaving the service. Each transition story is different, and no two Veterans have the same stress or experience…

Military

4 min read

How the Hiring Our Heroes Program Helped me Transition from the U.S.
How the Hiring Our Heroes Program Helped me Transition from the U.S.
Military

4 min read


Published in

ILLUMINATION

·Jan 21

10 Years Later: Reflecting on my Experience at Ranger School

Why You Should Hire Ranger-Qualified Veterans as Leaders — It is Never about You Leadership is about bringing those around you up. It has nothing to do with individual success. If you think it does, you will fail Ranger School and leadership efforts in life. I failed my first attempt at Ranger School; no excuse. I will share my Experience over a decade ago…

Leadership

4 min read

10 Years Later: Reflecting on my Experience at Ranger School
10 Years Later: Reflecting on my Experience at Ranger School
Leadership

4 min read


Published in

Nerd For Tech

·Jan 9

Nomad + WASM

Kicking the Tires After KubeCon with Nomad + WASM WebAssembly, sometimes abbreviated WASM was a popular topic at KubeCon 2022. A few people explained it as a way to not worry about as much garbage collection (GC). WASM provides a way to remove layers of infrastructure and produce more value through byte code. The textbook definition of WebAssembly is…

Wasm

3 min read

Nomad + WASM
Nomad + WASM
Wasm

3 min read


Published in

HashiCorp Solutions Engineering Blog

·Dec 6, 2022

DoD Zero Trust Strategy in Practice

HashiCorp responds to the Zero Trust Strategy: Get Started! Blog Notes Audience: practitioners, security professionals, operations teams, and technical advisers Cyber attacks have increased by 28% globally in the third quarter compared to last year. These attacks spread across many sectors like education, healthcare, energy, and even the Department of…

Hashicorp Vault

8 min read

DoD Zero Trust Strategy in Practice
DoD Zero Trust Strategy in Practice
Hashicorp Vault

8 min read

Greg Thomas

Greg Thomas

895 Followers

Passionate writer with a focus on tech, leadership and fitness. Sharing my take on these topics on Medium

Following
  • Jason Provencio

    Jason Provencio

  • Neil Shah

    Neil Shah

  • Veronica Llorca-Smith

    Veronica Llorca-Smith

  • Ravi Yasakeerthi

    Ravi Yasakeerthi

  • Israel Josué Parra Rosales

    Israel Josué Parra Rosales

See all (706)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams