<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[VIA Knowledge Hub]]></title><description><![CDATA[Building DoD cloud or edge software? Skip the overwhelm. Our curated, tech-focused resources help you ship fast, stay secure, and be compliant.]]></description><link>https://www.viaknowledgehub.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Lk4u!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0f0e2b5e-e8ba-43d4-b4a2-e9b3adc9c133_256x256.png</url><title>VIA Knowledge Hub</title><link>https://www.viaknowledgehub.com</link></image><generator>Substack</generator><lastBuildDate>Fri, 03 Apr 2026 20:04:21 GMT</lastBuildDate><atom:link href="https://www.viaknowledgehub.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[VIA]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[viaknowledgehub@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[viaknowledgehub@substack.com]]></itunes:email><itunes:name><![CDATA[VIA Knowledge Hub]]></itunes:name></itunes:owner><itunes:author><![CDATA[VIA Knowledge Hub]]></itunes:author><googleplay:owner><![CDATA[viaknowledgehub@substack.com]]></googleplay:owner><googleplay:email><![CDATA[viaknowledgehub@substack.com]]></googleplay:email><googleplay:author><![CDATA[VIA Knowledge Hub]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[The Four Ps every developer needs to know before their next product decision with Eve Maler]]></title><description><![CDATA[Most teams treat identity like plumbing: invisible, unglamorous, and someone else&#8217;s problem&#8230; until something breaks.]]></description><link>https://www.viaknowledgehub.com/p/the-four-ps-every-developer-needs</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/the-four-ps-every-developer-needs</guid><dc:creator><![CDATA[Emily Humphrey]]></dc:creator><pubDate>Wed, 18 Mar 2026 20:29:56 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/191408795/2508822851ab67be637f6eaefa995ccd.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Most teams treat identity like plumbing: invisible, unglamorous, and someone else&#8217;s problem&#8230; until something breaks. Eve Maler has spent thirty years proving that&#8217;s the wrong mental model, and it&#8217;s costing companies more than they realize.</p><p>As the co-creator of SAML and User-Managed Access, former CTO of ForgeRock, and author of the forthcoming Mastering Digital Identity: From Risk to Revenue, Eve introduces a sharper lens: identity is a product. The teams that own it intentionally ship faster, convert better, and lose less to fraud. The ones that don&#8217;t are one incident away from finding out why it mattered.</p><p>Eve shares her Four Ps framework: Protection, Personalization, Payment, and People, and explains why fraud is a design problem long before it becomes a detection problem. She also makes the case for why decentralized identity isn&#8217;t a future trend to monitor. It&#8217;s a present-tense decision your team is already making, whether you know it or not.</p><h3><strong>Topics Covered</strong></h3><ul><li><p>Why identity is part of your technology strategy</p></li><li><p>What &#8220;identity strategy&#8221; actually means for developers (not just CISOs)</p></li><li><p>The Four Ps framework: Protection, Personalization, Payment, and People</p></li><li><p>Why identity and payments are inseparable, and what&#8217;s at stake when they&#8217;re not designed together</p></li><li><p>Fraud as a design problem: modeling happy paths and unhappy paths</p></li><li><p>The cost of separating fraud teams from development teams</p></li><li><p>What changes when your org has a dedicated identity product owner</p></li><li><p>Decentralized identity: why it&#8217;s happening now, and what developers need to know</p></li><li><p>How to make the case for identity investment to a CEO or board</p></li><li><p>Baking identity in from the start vs. scrambling to fix it after launch</p></li></ul><h3><strong>About Eve Maler</strong></h3><p>Eve Maler is President and Founder of Venn Factory and an award-winning Digital Identity Strategist, whose work has influenced how people, organizations, and technologies establish identity, exchange data, and operate securely at scale. From early Internet standards such as XML to identity-defining protocols including SAML and User-Managed Access, Eve has helped build the underlying systems that enterprises around the world rely on every day.</p><p>Her career in identity spans 25+ years, from Technology Director at Sun Microsystems to Chief Technology Officer of ForgeRock, where she brought identity innovation strategy to dozens of Global 5000 brands. As a former Forrester Research security analyst and now founder of Venn Factory, Eve transforms companies&#8217; digital identity strategies from a cost center into a growth engine by reducing friction, optimizing security and privacy protection, and unlocking new revenue opportunities.</p><p>Her influence can be seen across global initiatives, including UK Open Banking and U.S. and Canadian health IT efforts. </p><p>An author, speaker, and board member, Eve is known for connecting technical reality with business outcomes and for showing why, when identity is done right, it becomes one of the most powerful levers of competitive advantage.</p><ul><li><p>Connect with our guest Eve Maler: <a href="https://www.linkedin.com/in/eve-maler">https://www.linkedin.com/in/eve-maler</a> </p></li></ul><div><hr></div><h4>Make it secure and ship faster? Yes, please. We built the easy button for military-grade authentication.</h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.viaknowledgehub.com/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try the tutorial free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.viaknowledgehub.com/ztf-tutorial"><span>Try the tutorial free</span></a></p><div><hr></div><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[How to break into DevSecOps (without expensive bootcamps) with Damien Burks]]></title><description><![CDATA[DevSecOps is everywhere right now, but most teams are still treating it like a tooling problem.]]></description><link>https://www.viaknowledgehub.com/p/how-to-break-into-devsecops-without</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/how-to-break-into-devsecops-without</guid><dc:creator><![CDATA[Emily Humphrey]]></dc:creator><pubDate>Thu, 26 Feb 2026 18:35:44 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/189268122/999db7bb4b03dfdaac9a1a6127aa5532.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>DevSecOps is everywhere right now, but most teams are still treating it like a tooling problem. Damien Burks says it&#8217;s actually a culture problem. He&#8217;s a DevSecOps expert and the founder of the DevSec Blueprint, a free, open-source learning guide with a 650+ member community. His mission: help people break into DevSecOps by focusing on foundations and systems thinking, not expensive bootcamps.</p><p>In this episode, Damien explains why DevSecOps engineers are &#8220;the glue&#8221;, the people connecting developers, operations, legal, and compliance into a single security-minded team. He walks through the patterns that repeat across every cloud platform, why the first thing you should automate is your CI/CD pipeline, and how to think about LLM risks (hallucinations, data residency, prompt injection) when you&#8217;re working in regulated environments. He also shares the story of a woman in Africa who used the DevSec Blueprint to land her first internship, proof that accessible education works.</p><p>The bottom line: security isn&#8217;t something you bolt on at the end. It&#8217;s a shared responsibility. And the sooner your team internalizes that, the faster (and safer) you&#8217;ll ship.</p><h3><strong>Topics Covered</strong></h3><ul><li><p>Why DevSecOps is a cultural movement, not a job title</p></li><li><p>DevSecOps engineers are &#8220;the glue&#8221;: connecting developers, operations, legal, and compliance</p></li><li><p>The DevSec Blueprint: an open-source learning guide for breaking into DevSecOps</p></li><li><p>Systems thinking over tool-chasing: recognizing patterns that work across platforms</p></li><li><p>Why soft skills and communication matter as much as technical chops</p></li><li><p>The #1 thing to automate this year: your CI/CD pipeline with security gates</p></li><li><p>Build, test, scan, deploy: the repeatable pattern inside every secure pipeline</p></li><li><p>LLM risks in regulated environments: hallucinations, data residency, and prompt injection</p></li><li><p>Air-gapped AI as a strategy for heavily regulated industries</p></li><li><p>Why prompt injection is still an unsolved problem and what that means for DevSecOps</p></li><li><p>The DevSecOps Home Lab: buying two machines from a pawn shop and learning by doing</p></li><li><p>One mindset shift: &#8220;Security is a shared responsibility&#8221;</p></li></ul><h2>About Damien Burks</h2><p>Damien Burks is a DevSecOps leader, security engineer, educator, and the founder of the DevSec Blueprint, a free, open-source learning guide that helps people transition into DevSecOps and cloud security development. With a background in software development and experience working in heavily regulated environments, Damien focuses on making security education accessible, practical, and community-driven. His Discord community has grown to over 650 members who actively contribute projects and capstone exercises. Damien also creates content on YouTube covering cloud security, DevSecOps, and the tech career landscape. His philosophy: less tools, more foundations, and always lead with the mindset that security is a shared responsibility.</p><ul><li><p>Connect with our guest Damien Burks: <a href="https://www.linkedin.com/in/damienburks">LinkedIn</a></p></li><li><p>Check out The DevSec Blueprint: <a href="https://devsecblueprint.com">https://devsecblueprint.com</a></p></li></ul><div><hr></div><h4><strong>Make it secure and ship faster? Yes, please. We built the easy button for military-grade authentication.</strong></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.viaknowledgehub.com/i/183931864/make-it-secure-and-ship-faster-yes-please-we-built-the-easy-button-for-military-grade-authentication&quot;,&quot;text&quot;:&quot;Try the tutorial free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.viaknowledgehub.com/i/183931864/make-it-secure-and-ship-faster-yes-please-we-built-the-easy-button-for-military-grade-authentication"><span>Try the tutorial free</span></a></p><div><hr></div><p></p>]]></content:encoded></item><item><title><![CDATA[The one security practice most teams skip: tabletop exercises with Jeff Fields]]></title><description><![CDATA[Listen now (42 mins) | Most security teams aren&#8217;t underprepared because they lack tools, they&#8217;re underprepared because they haven&#8217;t rehearsed what happens when humans, systems, and pressure collide.]]></description><link>https://www.viaknowledgehub.com/p/the-one-security-practice-most-teams</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/the-one-security-practice-most-teams</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Thu, 12 Feb 2026 14:38:24 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/187747889/59f6bbe9a950422509d8d9f75acabded.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-TmyKn4JGt8o" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;TmyKn4JGt8o&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/TmyKn4JGt8o?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Most security teams aren&#8217;t underprepared because they lack tools, they&#8217;re underprepared because they haven&#8217;t rehearsed what happens when humans, systems, and pressure collide. Jeff Fields says that the single most important thing teams can do is run tabletop exercises.</p><p>Fresh off a 20-year FBI career, Jeff explains why the most damaging incidents aren&#8217;t caused by &#8220;unknown threats,&#8221; but by breakdowns inside the organization, alerts going to the wrong people, missing owners, and teams operating in silos. Tabletop exercises expose those weak points early, forcing engineering, HR, legal, leadership, and comms to operate as one security team. The result is a security posture that assumes human error, limits blast radius, and lets teams ship faster with confidence.</p><h2>Topics Covered</h2><ul><li><p>Why &#8220;there&#8217;s no separating the digital from the human&#8221; in modern cyber attacks</p></li><li><p>Nation-state motivations: how PRC, Russia, North Korea, and others target differently</p></li><li><p>The &#8220;geopolitical layer cake&#8221; and why every builder is in it (whether they like it or not)</p></li><li><p>Security as a team sport: breaking silos between engineering, HR, legal, physical security, and leadership</p></li><li><p>Why basic information sharing is the cheapest &#8220;upgrade&#8221; most companies aren&#8217;t doing</p></li><li><p>The Sony hack lesson: when the alerts won&#8217;t stop&#8230; and someone turns them off</p></li><li><p>&#8220;Humans be humans&#8221;: designing systems that assume mistakes will happen</p></li><li><p>Bake security in from the start vs. bolting it on after launch</p></li><li><p>Zero Trust explained in plain English and why it can <em>accelerate</em> innovation</p></li><li><p>Why table top exercises/war games separate resilient teams from chaotic ones</p></li><li><p>Planning for the least likely, most catastrophic scenario (and why it covers everything else)</p></li><li><p>Where to get government resources: fbi.gov, dni.gov, and National Counterintelligence and Security Center (NCSC) support for the private sector<br></p></li></ul><h2>About Jeff Fields</h2><p><a href="https://www.linkedin.com/in/jeff-f-63736a173/">Jeff Fields</a> is a newly retired FBI leader, most recently serving as Assistant Special Agent in Charge of the FBI&#8217;s Counterintelligence Branch in San Francisco, with 20 years of experience spanning counterintelligence, national security, and the defense industrial base including emerging tech and the innovation ecosystem. Now advising VCs, startups, and universities, Jeff brings a rare operator&#8217;s perspective on how real-world adversaries move and how builders can design security that supports speed instead of fighting it. </p><p>In addition to being a technical advisor, Jeff is also a Senior Fellow of Practice at the Berkeley Institute for Security and Governance where he serves as a &#8220;Hacking for Defense&#8221; (H4D) instructor. H4D teaches students how to work with the government to rapidly address the nation&#8217;s emerging threats and to solve mission-critical problems at the speed of a startup. In his free time Jeff enjoys hiking with his two Belgian Malinois, volunteering with the non-profit Girl Security, or checking out a live opera or hip-hop show.</p><div><hr></div><h4><strong>Make it secure and ship faster? Yes, please. We built the easy button for military-grade authentication.</strong></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try the tutorial free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial"><span>Try the tutorial free</span></a></p>]]></content:encoded></item><item><title><![CDATA[Decentralized identity in the age of AI agents with Kaliya Young]]></title><description><![CDATA[What does decentralized identity really mean, and why is it becoming essential in a world of AI, deepfakes, and digital fraud?]]></description><link>https://www.viaknowledgehub.com/p/decentralized-identity-in-the-age</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/decentralized-identity-in-the-age</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Thu, 08 Jan 2026 17:30:14 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/183931864/62ae85469820b47ad462844461c54e59.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-uzmpzOQgZC8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;uzmpzOQgZC8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/uzmpzOQgZC8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>What does decentralized identity really mean, and why is it becoming essential in a world of AI, deepfakes, and digital fraud?</p><p>In this episode, we sit down with <a href="https://www.linkedin.com/in/kaliya/">Kaliya Young</a>. Kaliya is widely known as the &#8220;Identity Woman&#8221; and is one of the earliest pioneers of decentralized and self-sovereign identity. With over 20 years in the field, Kaliya breaks down complex concepts like decentralized identifiers (DIDs) and verifiable credentials in practical, real-world terms.</p><p>Kaliya explains how decentralized identity reshapes trust, privacy, and security across many different entities, including people, businesses, AI agents, and physical assets. From digital driver&#8217;s licenses and business wallets to supply chains and autonomous systems, this conversation offers a grounded look at how identity infrastructure is evolving. It is clear that old paper-based and centralized models are no longer enough for highly regulated industries.</p><p><strong>Topics covered</strong></p><ul><li><p>What decentralized identity actually means</p></li><li><p>How decentralized identifiers (DIDs) work</p></li><li><p>Verifiable credentials and why they matter</p></li><li><p>Trust and privacy in the age of AI and deepfakes</p></li><li><p>Business and enterprise use cases like know your customer (KYC) and know your business (KYB)</p></li><li><p>Identity for AI agents and autonomous systems</p></li><li><p>Digital wallets for people, businesses, and assets</p></li><li><p>Revocation, security, and privacy-preserving design</p></li><li><p>Where developers and organizations can get involved</p></li></ul><h2><strong>About Kaliya Young</strong></h2><p>Kaliya Young, often called the &#8220;Identity Woman,&#8221; has been working on decentralized and self-sovereign identity for over 20 years. She works closely with developers, policymakers, and standards bodies to help make digital identity more secure, private, and human-centered.</p><p>Kaliya is also the founder and host of the Internet Identity Workshop (IIW), an unconference that brings together identity practitioners from around the world to shape the future of digital identity. Through her writing, workshops, and advisory work, she plays a central role in how decentralized identity, verifiable credentials, and trust frameworks are evolving today.</p><ul><li><p>Connect with our guest Kaliya Young:<a href="https://identitywoman.net/"> </a><a href="https://www.linkedin.com/in/kaliya/">https://www.linkedin.com/in/kaliya/</a></p></li><li><p>Join the Identity Woman newsletter: </p></li></ul><div class="embedded-publication-wrap" data-attrs="{&quot;id&quot;:108246,&quot;name&quot;:&quot;Sovereign Identity Updates&quot;,&quot;logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!yNEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16959d8a-f589-44de-8095-c10646b4f86f_640x640.png&quot;,&quot;base_url&quot;:&quot;https://newsletter.identosphere.net&quot;,&quot;hero_text&quot;:&quot;Each week Identity Woman and Infominer bring the latest news in decentralized identity to your inbox. &#10084;&#65039; Subscribe Free Here. &#10084;&#65039;&quot;,&quot;author_name&quot;:&quot;IdentityWoman&quot;,&quot;show_subscribe&quot;:true,&quot;logo_bg_color&quot;:&quot;#f5f5f5&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPublicationToDOMWithSubscribe"><div class="embedded-publication show-subscribe"><a class="embedded-publication-link-part" native="true" href="https://newsletter.identosphere.net?utm_source=substack&amp;utm_campaign=publication_embed&amp;utm_medium=web"><img class="embedded-publication-logo" src="https://substackcdn.com/image/fetch/$s_!yNEy!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F16959d8a-f589-44de-8095-c10646b4f86f_640x640.png" width="56" height="56" style="background-color: rgb(245, 245, 245);"><span class="embedded-publication-name">Sovereign Identity Updates</span><div class="embedded-publication-hero-text">Each week Identity Woman and Infominer bring the latest news in decentralized identity to your inbox. &#10084;&#65039; Subscribe Free Here. &#10084;&#65039;</div><div class="embedded-publication-author-name">By IdentityWoman</div></a><form class="embedded-publication-subscribe" method="GET" action="https://newsletter.identosphere.net/subscribe?"><input type="hidden" name="source" value="publication-embed"><input type="hidden" name="autoSubmit" value="true"><input type="email" class="email-input" name="email" placeholder="Type your email..."><input type="submit" class="button primary" value="Subscribe"></form></div></div><div><hr></div><h4><strong>Make it secure and ship faster? Yes, please. We built the easy button for military-grade authentication.</strong></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try the tutorial free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial"><span>Try the tutorial free</span></a></p>]]></content:encoded></item><item><title><![CDATA[You can’t just unplug it: The reality of space resilience]]></title><description><![CDATA[Space is where we have the opportunity to invent life-saving drugs, track natural disasters and national security threats, and connect the globe. But as we rely more on these assets, the threats from orbital debris and cyberattacks are mounting.]]></description><link>https://www.viaknowledgehub.com/p/you-cant-just-unplug-it-the-reality</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/you-cant-just-unplug-it-the-reality</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Wed, 17 Dec 2025 17:29:11 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/181908614/f419f2ed492cae29ca7c3a788870d691.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-FBdlNSQTDF8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;FBdlNSQTDF8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/FBdlNSQTDF8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Space is where we have the opportunity to invent life-saving drugs, track natural disasters and national security threats, and connect the globe. But as we rely more on these assets, the threats from orbital debris and cyberattacks are mounting.</p><p>The problem? You can&#8217;t just walk up to a satellite, unplug it, and plug it back in.</p><p><a href="https://www.linkedin.com/in/criderkim">Major General Kim Crider (ret.)</a>, Founding Partner at Elara Nova, former Chief Technology and Innovation Officer, U.S. Space Force and former Chief Data Officer, U.S. Air Force, joins us to explain why a cyber incident in orbit isn&#8217;t just an annoyance, it&#8217;s a potential kinetic disaster. She explains why Zero Trust principles must be built into systems, and why the most dangerous &#8220;backdoor&#8221; to spacecraft often sits right here on Earth.</p><p><strong>Key takeaways:</strong></p><ul><li><p><strong>The stakes are physical.</strong> If a cyberattack alters a trajectory, a satellite or spacecraft risks colliding with other critical assets or debris.</p></li><li><p><strong>The &#8220;front door&#8221; is on the ground.</strong> While we worry about the asset in orbit, the easiest way to hack a satellite is often through the ground environment. Uplinks and downlinks (the invisible tethers controlling the system) are prime targets for spoofing and interception.</p></li><li><p><strong>Zero Trust must launch with the rocket.</strong> You cannot easily patch a system once it leaves the atmosphere. Security principles like Zero Trust and rollback capabilities must be designed, tested, and baked in before launch day.</p></li><li><p><strong>Digital airlocks.</strong> With complex supply chains, you can&#8217;t guarantee every component is secure or fail-safe. Systems must be designed to isolate compromised functions so a single failure doesn&#8217;t jeopardize the entire mission.</p></li><li><p><strong>Know your bill of materials.</strong> Whether it&#8217;s a satellite or a UAV, supply chain opacity is a major risk. Rigorous verification, provenance tracking, and inspections of software and hardware are essential to keeping bad actors out of mission-critical systems.</p></li><li><p><strong>Space is the next laboratory.</strong> Beyond surveillance, the vacuum and zero-gravity conditions of space offer a unique environment for manufacturing and scientific breakthroughs, such as inventing new, life-saving pharmaceuticals that aren&#8217;t possible to create on Earth.</p></li></ul><h2><strong>About Major General Kim Crider (ret.)</strong></h2><p><a href="https://www.linkedin.com/in/criderkim">Major General Kim Crider</a> is a Founding Partner at Elara Nova, a space consulting firm helping the government and industry navigate the space market. She previously served as the Chief Technology Innovation Officer for the United States Space Force and the Chief Data Officer for the United States Air Force. With 35 years of service, including eight years in active duty, she is a leading authority on data, space, and air defense.</p><div><hr></div><h4><strong>Make it secure and ship faster? Yes, please. We built the easy button for military-grade authentication.</strong></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try the tutorial free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial"><span>Try the tutorial free</span></a></p>]]></content:encoded></item><item><title><![CDATA[A dev’s guide to AI agents]]></title><description><![CDATA[AI agents and agentic browsers ingest massive amounts of data and are often given unrestricted access.&#160;The challenge is to maintain enterprise-grade security without breaking the user experience.]]></description><link>https://www.viaknowledgehub.com/p/a-devs-guide-to-ai-agents</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/a-devs-guide-to-ai-agents</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Fri, 12 Dec 2025 16:05:53 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/7ab5736a-018f-4ea3-aafe-3b5612982813_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!QWuc!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!QWuc!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!QWuc!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!QWuc!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!QWuc!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!QWuc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:75810,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/181427267?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!QWuc!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!QWuc!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!QWuc!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!QWuc!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa67a6002-3945-4f0f-bb3d-9475b0295b04_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><code>What&#8217;s inside:</code></p><ul><li><p><code>Five things devs need to know for our agentic future</code></p></li><li><p><code>Resources: Step-up authentication tutorial, &#8220;The AI agent access problem&#8221; with author of &#8220;Securing AI Agents&#8221; Chris Hughes, and OWASP&#8217;s GenAI Security Project</code></p></li></ul><h1>Five things to know for our agentic future</h1><p>&#8220;Have your agent call my agent&#8221; isn&#8217;t just a Hollywood thing anymore. AI agents are increasingly &#8220;speaking&#8221; on behalf of the end user, but without guardrails and contracts that typically bind the human variety.</p><p>AI agents and agentic browsers ingest massive amounts of data and are often given unrestricted access.</p><p><strong>The challenge is to maintain enterprise-grade security without breaking the user experience.</strong></p><p>Your users don&#8217;t know what a &#8220;token&#8221; is. They don&#8217;t care about &#8220;private keys.&#8221; And frankly, they shouldn&#8217;t have to.</p><p>Their only goal is to get value out of your application. That means they aren&#8217;t thinking about the security implications of the AI agent running in the background.</p><blockquote><p><strong>But as developers, we have to.</strong></p></blockquote><p>Here are a few tips for ensuring the software you build is both secure and usable for our agentic future:</p><ol><li><p><strong>Deliver value </strong><em><strong>and</strong></em><strong> security. </strong>Don&#8217;t make users think about technical concepts like tokens and private and public keys. Your job is to protect the user and their data while letting them focus entirely on the value your product provides.<strong> </strong>But recognize there are moments where intentional friction is needed. For example, AI agents should be forced to get permission for critical, high-risk actions. This means the user always stays in control.</p><ul><li><p><strong>Bonus</strong>: If you&#8217;re curious about how to ensure users can approve high-risk actions, check out my tutorial: <em><a href="https://www.viaknowledgehub.com/p/five-steps-to-secure-your-app-against">Five steps to secure your app against rogue AI agents: How to implement step-authentication using VIA&#8217;s Zero Trust Fabric</a></em></p></li></ul></li><li><p><strong>Abstract the technical complexity. </strong>Internally, we constantly ask, &#8220;Why does the user need to do this?&#8221; or &#8220;is this step really necessary?&#8221; or &#8220;will the user understand this?&#8221; to help us strip away the noise and ensure a simple, straightforward user experience.</p></li><li><p><strong>Get comfortable talking about risk. </strong>Not all risk is created equal and you&#8217;ll just be spinning your wheels if you try to protect everything against everything. Developers must understand the highest risk for their systems. Is it exposing personally identifiable information (PII)? Compromising financial transactions? When creating an application, developers must understand what risks have the highest probability of occurring and focus on reducing the risk around those things.</p></li><li><p><strong>&#65279;&#65279;&#65279;Authenticate like it&#8217;s 1999...or 2026. </strong>Traditional tokens that give people access are now being delegated to AI agents, which could operate without being seen and technically take over accounts. Once an agentic AI holds a user&#8217;s session token, it effectively is the user. A powerful, fast, and potentially reckless user who can also be compromised by threat actors.</p></li><li><p><strong>Stop designing for a single AI agent. Design for a fleet. </strong>We are heading toward a world where your users (and you, as developers!) will interact with dozens of specialized agents daily. The old model of centralized access controls won&#8217;t scale for that.</p></li></ol><h2>How I&#8217;ve put these tips into practice</h2><p>Here&#8217;s how we&#8217;ve put these tips into practice at VIA. Right now, if a user employs an AI agent, that agent inherits all of the user&#8217;s permissions, effectively cloning the user&#8217;s session. That is a massive security gap. By making the user akin to a &#8216;local identity provider,&#8217; we allow them to issue restricted, task-specific credentials to their agents. This fundamental concept informed how we designed <a href="https://www.solvewithvia.com/via-ztf/">VIA&#8217;s Zero Trust Fabric (ZTF)</a>.  It ensures that if an agent is compromised, it only has access to that one specific task, not the user&#8217;s entire account.</p><blockquote><p>Interested in testing out how to secure your app (and protect your users) from AI agents? Check out my free <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth">tutorial on GitHub</a>.</p></blockquote><p>Developers play a critical role in ensuring AI agents operate as designed, playing to their strengths and leaving the critical decisions to end users.</p><h3><strong>About Jesus Cardenes</strong></h3><p><a href="https://www.linkedin.com/in/jesus-alejandro-cardenes-cabre/">Jesus Cardenes</a>, VIA&#8217;s Senior Vice President, Product Architecture, is responsible for the technical roadmap and architectural design of all VIA products and its Web3 platform. He is known for his expertise in connecting technologies and platforms to create seamless user experiences. An interesting fact about Jesus is that he loves to cycle during the weekends with his kids!</p><h1>Resources</h1><p><em>You have pressing questions&#8230;we have answers. So you can build faster and get back to shipping. Check out the resources below.</em></p><p><strong><a href="https://www.viaknowledgehub.com/p/five-steps-to-secure-your-app-against">Tutorial: Five steps to secure your app against rogue AI agents: How to implement step-authentication using VIA&#8217;s Zero Trust Fabric</a></strong></p><p>Learn how to secure your app from your users&#8217; rogue AI agents using <a href="https://www.solvewithvia.com/via-ztf/">VIA&#8217;s Zero Trust Fabric (ZTF)</a> and step-up authentication. In this case, step-up authentication means the user has to re-authenticate to authorize high-risk actions.</p><p><strong><a href="https://www.viaknowledgehub.com/p/the-ai-agent-access-problem-with-chris-hughes">&#8220;The AI agent access problem&#8221; with Chris Hughes</a></strong><a href="https://www.viaknowledgehub.com/p/the-ai-agent-access-problem-with-chris-hughes">.</a></p><p><a href="https://www.linkedin.com/in/resilientcyber/">Chris Hughes</a>, CEO of Aquia, <em><a href="https://www.resilientcyber.io/">Resilient Cyber</a></em> podcast host, author of <em>Securing AI Agents</em>, and United States Air Force veteran, dives into why identity and access are brutally hard in an agentic AI world. He also explains how incentives, compliance, and culture shape what actually gets secured.</p><p><strong><a href="https://genai.owasp.org/">OWASP&#8217;s GenAI Security Project</a></strong></p><p>Trying to wrap your head around the security risks for LLMs, generative AI, AI agents, and MCP servers? OWASP&#8217;s GenAI Security project is one of our go-to resources.</p><p><strong><a href="https://genai.owasp.org/llm-top-10/">OWASP&#8217;s LLM Top 10 for 2025</a></strong></p><p>Forget the theoretical stuff. This lists the most dangerous risks, from prompt injection to the many flavors of unbounded consumption, and actually tells you what to <em>do</em> about them.</p><div><hr></div><h3>Learn how to secure your app from your users&#8217; rogue AI agents in our latest tutorial.</h3><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth&quot;,&quot;text&quot;:&quot;Get started on GitHub&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth"><span>Get started on GitHub</span></a></p>]]></content:encoded></item><item><title><![CDATA[The AI agent access problem]]></title><description><![CDATA[Chris Hughes dives into why identity and access are brutally hard in an agentic Al world. He also explains how incentives, compliance, and culture shape what actually gets secured.]]></description><link>https://www.viaknowledgehub.com/p/the-ai-agent-access-problem-with-chris-hughes</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/the-ai-agent-access-problem-with-chris-hughes</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Wed, 03 Dec 2025 20:39:03 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/180640366/b20ccaf98958878d15400e7cf2ab0bf9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-K682OepLhHo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;K682OepLhHo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/K682OepLhHo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>AI agents aren&#8217;t magic coworkers. They&#8217;re powerful, error-prone systems that can be hijacked, over-permissioned, and &#8220;social-engineered&#8221; just like humans. <a href="https://www.linkedin.com/in/resilientcyber/">Chris Hughes</a>, CEO of Aquia, <em><a href="https://www.resilientcyber.io">Resilient Cyber</a></em> podcast host, author of <em>Securing AI Agents</em>, and United States Air Force veteran, dives into why identity and access are brutally hard in an agentic AI world. He also explains how incentives, compliance, and culture shape what actually gets secured.</p><h2>AI agents: the fundamentals matter, but don&#8217;t miss the nuance</h2><ul><li><p><strong>AI agents are risky &#8220;users&#8221; too.</strong> Agents make bizarre mistakes humans wouldn&#8217;t. And they can be taken over by threat actors. That means they need an identity, permissions, and access controls, not an all-access backstage pass.</p></li><li><p><strong>Identity and access management (IAM) is hard.... and SaaS often makes it harder.</strong> Most orgs over-provision access, never clean it up, and struggle to keep permissions current. SaaS tools frequently miss the business context needed to do access right. Chris cautions that those IAM tools themselves become part of the attack surface.</p></li><li><p><strong>&#65279;&#65279;The fundamentals still matter (a lot).</strong> Least privilege, micro-segmentation, and off-boarding are still important, even for agents. The goal? Minimize the damage agents can do and take away those permissions when they&#8217;re no longer needed.</p></li><li><p><strong>Developers should be aware of the many flavors of context manipulation.</strong> Context manipulation is where malicious instructions entice the AI agent to perform actions or disclose information it shouldn&#8217;t. Bookmark the <a href="https://genai.owasp.org/">OWASP GenAI Security Project</a>, which continually updates these risks.</p></li><li><p><strong>Zero Trust applies to agents, but incentives fight it. </strong>Zero Trust principles map cleanly onto agentic AI use cases, but business leaders are focused on speed, revenue, and market expansion, rather than abstract security models. They start caring when Zero Trust and agent security are framed as compliance, regulatory, or market-entry requirements. Compliance is still a primary driver of cybersecurity headcount and tooling. Use that lever.</p></li><li><p><strong>&#65279;&#65279;Agentic AI doesn&#8217;t change the need for good access control and security fundamentals, it just raises the stakes.</strong> As Chris says, &#8220;you can&#8217;t secure what you don&#8217;t understand,&#8221; so start by truly understanding how your agents act and what they have access to. If you&#8217;re in DevSecOps or application security, think about how you can make life easier for your dev team: &#8220;make doing the right thing the easy thing.&#8221;</p></li></ul><h2>&#65279;&#65279;About Chris Hughes</h2><p>&#65279;&#65279;Chris Hughes is a United States Air Force veteran and the CEO and co-founder of Aquia, where he helps secure state and federal agencies as well as the Department of Defense. He is the host of the <em><a href="https://www.resilientcyber.io">Resilient Cyber</a></em><a href="https://www.resilientcyber.io"> podcast</a> and a recognized expert in application security, software supply chain security, vulnerability management, and DevSecOps. Chris previously served as a Cyber Innovation Fellow (CIF) at the U.S. Cybersecurity and Infrastructure Security Agency (CISA).</p><p>Check out Chris&#8217;s three books:</p><ul><li><p><a href="https://www.amazon.com/Effective-Vulnerability-Management-Vulnerable-Ecosystem/dp/1394221207/ref=sr_1_5?dib=eyJ2IjoiMSJ9.G4ny2zADk3PGPx_iibM4MG4uu7as8vW1xzqAYNaEeL6ZorFqEgP7Kc6Zf3ZW-duMitJX8NCOgQOhMX1-1cKmbUClpgO8p7AwU7wS0zzWFM9thgurnlwCIf34euy5s082y6fDLyjTrf0BfXIatjsouUd9lweZxPJX_r7PBItFU6WgnuYVdvfUyz--weRJS5Lfnyt7fJ7FJV3clh5miyEbArjgStbT15nU-oFIoSPPPk4.8h35H8lAr-b3aUcicajp-T37_Nmve0_9kneol8ls0mg&amp;dib_tag=se&amp;qid=1763429104&amp;refinements=p_27%3AChris+Hughes&amp;s=books&amp;sr=1-5&amp;text=Chris+Hughes">Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem</a></p></li><li><p><a href="https://www.amazon.com/Securing-Agents-Foundations-Frameworks-Real-World/dp/3032021294">Securing AI Agents: Foundations, Frameworks, and Real-World Deployment</a></p></li><li><p><a href="https://www.amazon.com/Software-Transparency-Security-Software-Driven-Society-ebook/dp/B0C4CM9BK2/ref=sr_1_1?crid=S828ZXTK9SWX&amp;dib=eyJ2IjoiMSJ9.puhXwuJYNnGQ1GsgLAHs3OnGougvs_E0NKPbH5U2JVs.k8iP2XAhDh8CqOURYRuR_vi-qy67f3neBWcbO2qSqAI&amp;dib_tag=se&amp;keywords=software+transparency+chris+hughes&amp;qid=1763429247&amp;s=books&amp;sprefix=software+transparency+chris+hughes%2Cstripbooks%2C186&amp;sr=1-1">Software Transparency: Supply Chain Security in an Era of a Software-Driven Society</a></p></li></ul><div><hr></div><h4><strong>Make it secure and ship faster? Yes, please. We built the easy button for military-grade authentication.</strong></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try the tutorial free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial"><span>Try the tutorial free</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Five steps to secure your app against rogue AI agents]]></title><description><![CDATA[Secure your app from your users' rogue AI agents using VIA's Zero Trust Fabric (ZTF) and step-up authentication.]]></description><link>https://www.viaknowledgehub.com/p/five-steps-to-secure-your-app-against</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/five-steps-to-secure-your-app-against</guid><dc:creator><![CDATA[Jesus Cardenes]]></dc:creator><pubDate>Thu, 20 Nov 2025 18:52:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/ec457205-bc0a-461f-b4ab-590dda29fdc4_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!1zsw!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!1zsw!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!1zsw!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!1zsw!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!1zsw!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!1zsw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:84072,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/179463967?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!1zsw!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!1zsw!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!1zsw!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!1zsw!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F282e7b14-4a57-4faa-b5a2-61aa5809d6ed_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p>Prefer to jump right in? <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth">Get started on GitHub</a>.</p></div><p>Imagine your team builds accounting software. One of your customers uses an AI agent to automate invoice verification and payment scheduling. Everything runs smoothly until the agent is hijacked. A single rogue instruction swaps out the bank details of their top five vendors with a fraudster&#8217;s account. Within minutes, your app dutifully executes five million dollars in fraudulent payments.</p><p>Now multiply that across hundreds of customers. You didn&#8217;t build the agent, but your system just became the weapon.</p><p>As the engineer designing this software, how do you stop an authorized, but compromised, agent from committing massive, irreversible fraud? The answer lies in securing high-risk actions.</p><p>As AI agents and agentic browsers become standard, the security challenge shifts. It&#8217;s no longer enough to protect logins and tokens. You have to verify the intent behind every sensitive action. The goal: maintain a seamless, passwordless experience for your users, while ensuring that every critical transaction has non-repudiable (meaning you can prove who did what), explicit authorization.</p><blockquote><p><strong>Pro tip:</strong> Treat an AI agent like an insider threat. Once an agentic AI holds a user&#8217;s session token, it effectively is the user: powerful, fast, and potentially reckless. Think of it like leaving a five-year-old alone: they might make some sensible decisions, but you must code with the very real possibility that they will burn the house down (i.e., drain an account or delete a database).</p></blockquote><h1>What you&#8217;re about to build</h1><p>In this tutorial, I will show you how to secure your app from your users&#8217; rogue AI agents using <a href="https://www.solvewithvia.com/via-ztf/">VIA&#8217;s </a><strong><a href="https://www.solvewithvia.com/via-ztf/">Zero Trust Fabric (ZTF)</a></strong> and step-up authentication. In this case, step-up authentication means the user has to re-authenticate to authorize high-risk actions.</p><p>You&#8217;ll build a React application that leverages <strong>WalletConnect v2.0</strong> and <strong>Keycloak</strong> to establish:</p><ol><li><p><strong>Passwordless initial authentication:</strong> The user logs in via a simple wallet scan, establishing a decentralized session.</p></li><li><p><strong>Cryptographic step-up:</strong> For sensitive actions, like making a payment or transferring a file, we&#8217;ll force the agent to request a unique, <strong>asymmetric cryptographic signature</strong> from the end-user&#8217;s wallet.</p></li></ol><p>This new workflow ensures that even if an agent has access to the application, the <strong>ultimate authority for critical actions remains with the human user</strong>, mathematically verified by a signature that is impossible to fake or reuse. You&#8217;ll move beyond passwords and static keys to secure the actions themselves.</p><h3><strong>The complete flow in action</strong></h3><ol><li><p><strong>User logs in</strong> &#8594; Keycloak handles passwordless authentication</p></li><li><p><strong>System recovers session</strong> &#8594; WalletConnect info extracted from user endpoint</p></li><li><p><strong>Wallet reconnects</strong> &#8594; Cryptographic session automatically restored</p></li><li><p><strong>User performs action</strong> &#8594; System detects need for step-up authentication</p></li><li><p><strong>Cryptographic proof</strong> &#8594; personal_sign provides mathematical verification</p></li><li><p><strong>Action authorized</strong> &#8594; No passwords, no SMS codes, no friction</p></li></ol><h1>Prerequisites (don&#8217;t skip this)</h1><p>This implementation guide focuses specifically on the ZTF step-up logic. It assumes the basic environment is already configured.</p><p>Before we start, make sure you have:</p><ul><li><p>Node.js (v18+) and npm/yarn</p></li><li><p>React framework</p></li><li><p>WalletConnect SDK</p></li><li><p>Keycloak SDK</p></li><li><p>Docker</p></li><li><p><a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-1-Passwordless">Tutorial 1: Passwordless</a> (not required, but a great intro reference!)</p></li></ul><p><strong>This is the actual production code.</strong> No theoretical examples. This is what can run in real applications. </p><blockquote><p>If you&#8217;d prefer to jump right in, <strong>get started by downloading the complete codebase</strong>: <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth">GitHub Repository</a>.</p></blockquote><h1>Step 1: Passwordless authentication via Keycloak</h1><p>To start, let&#8217;s make sure our users can securely (but easily) authenticate through <a href="https://www.keycloak.org/">Keycloak </a>without using passwords. We will be using the ZTF plugin for Keycloak to authenticate/authorize with the VIA wallet:</p><pre><code>// App.tsx - Keycloak initialization
const keycloak = new Keycloak({
  url: &#8220;https://auth.solvewithvia.com/auth&#8221;,
  realm: &#8220;ztf_demo&#8221;,
  clientId: &#8220;localhost-app&#8221;,
});

useEffect(() =&gt; {
  keycloak.init({
    onLoad: &#8220;login-required&#8221;,
    redirectUri: window.location.origin + &#8220;/&#8221;,
    checkLoginIframe: false,
    responseMode: &#8220;query&#8221;,
    pkceMethod: &#8220;S256&#8221;,
    scope: &#8220;openid profile email&#8221;
  })
  .then(auth =&gt; {
    if (keycloak.authenticated) {
      setAuthenticated(true);
      // Load app config after authentication
      loadAppConfig(keycloak);
    }
  });
}, []);
</code></pre><h1>Step 2: User session information recovery with WalletConnect session data</h1><p>In traditional web2 apps, a user would have to authenticate and then pick their crypto wallet of choice if the application wanted the user to interact with web3 systems. Not a great user experience.</p><p>This is where ZTF is different. The user&#8217;s cryptographic session information is recovered from the authentication endpoint. Thanks to VIA Wallet, users can passwordlessly authenticate and create a communication channel with the wallet to allow for blockchain interactivity. ZTF creates a walletconnect session and transfers that session to the application via Keycloak.</p><pre><code>// ConfigService.tsx - Extract WalletConnect session from user info
const loadAppConfig = async (keycloak: any) =&gt; {
  try {
    const realm = &#8216;ztf_demo&#8217;;
    const userInfoUrl = `https://auth.solvewithvia.com/auth/realms/${realm}/protocol/openid-connect/userinfo`;

    const response = await fetch(userInfoUrl, {
      method: &#8216;GET&#8217;,
      headers: {
        &#8216;Authorization&#8217;: `Bearer ${keycloak.token}`,
        &#8216;Content-Type&#8217;: &#8216;application/json&#8217;
      }
    });

    const userInfoData = await response.json();

    // Extract and decode walletConnectSessionInfo
    let decodedWalletConnectInfo = null;
    if (userInfoData.walletConnectSessionInfo) {
      const decodedString = atob(userInfoData.walletConnectSessionInfo);
      decodedWalletConnectInfo = JSON.parse(decodedString);
    }

    setWalletConnectInfo(decodedWalletConnectInfo);
  } catch (err) {
    console.error(&#8217;Error loading app config:&#8217;, err);
  }
};
</code></pre><h1>Step 3: WalletConnect session recovery and initialization</h1><p>The recovered session data automatically reconnects the user&#8217;s cryptographic wallet. By recovering the WalletConnect session from ZTF, the user is able to directly interact with web3 blockchains without needing to reconnect their wallet. This greatly simplifies the user experience.</p><pre><code>// App.tsx - Initialize WalletConnect with recovered session
useEffect(() =&gt; {
  if (isInitialized &amp;&amp; walletConnectInfo &amp;&amp; authenticated &amp;&amp; !sessionInitialized) {
    initializeWithSessionInfo(walletConnectInfo);
    setSessionInitialized(true);
  }
}, [isInitialized, walletConnectInfo, authenticated, sessionInitialized]);

// WalletConnectProvider.tsx - Session restoration
const initializeWithSessionInfo = async (sessionInfo: any) =&gt; {
  try {
    // Store recovered session data
    if (sessionInfo) {
      await storageService.storeWcInfo(sessionInfo);
    }

    // Initialize WalletConnect client
    const signClient = await initWalletConnect(storageService);

    // Check for existing sessions and restore connection
    const sessions = signClient.session.getAll();
    if (sessions.length &gt; 0) {
      const activeSession = sessions[0];
      setSession(activeSession);
    }
  } catch (error) {
    console.error(&#8217;Failed to initialize WalletConnect:&#8217;, error);
  }
};
</code></pre><h1>Step 4: The step-up authentication magic: personal_sign</h1><p>For sensitive actions, the system requires cryptographic proof from the user via a personal_sign signature using WalletConnect v2.0.</p><p>In a world of agent-driven browsers, this process is a crucial security feature. It ensures that for all <strong>critical actions</strong> (such as transferring funds or submitting a large purchase order) the agent is forced to pause and request the <strong>cryptographic proof</strong> directly from the human user&#8217;s wallet.</p><p>No explicit approval, no action taken.</p><pre><code>// TransactionService.tsx - Step-up authentication with personal_sign
const signMessage = async (message: string): Promise&lt;string | null&gt; =&gt; {
  if (!client || !session) {
    console.error(&#8217;WalletConnect not connected&#8217;);
    return null;
  }

  try {
    setIsLoading(true);

    // Zero Trust validation - verify active session
    const activeSessions = client.session.getAll();
    const hasActiveSession = activeSessions.some(s =&gt; s.topic === session.topic);

    if (!hasActiveSession) {
      throw new Error(&#8217;Session not found in active sessions. Please connect your wallet again.&#8217;);
    }

    // Extract account from viasecurechain namespace
    const accounts = session.namespaces.viasecurechain?.accounts || [];
    const fullAccount = accounts[0]; // e.g., &#8220;viasecurechain:mainnet:0xbA447B1...&#8221;
    const fromAccount = fullAccount.split(&#8217;:&#8217;)[2]; // Extract address
    const chainId = fullAccount.split(&#8217;:&#8217;).slice(0, 2).join(&#8217;:&#8217;);

    // Request cryptographic signature for step-up authentication
    const params = [
      ethers.utils.hexlify(ethers.utils.toUtf8Bytes(message)),
      fromAccount
    ];

    const signature = await client.request({
      topic: session.topic,
      chainId: chainId,
      request: {
        method: &#8216;personal_sign&#8217;,
        params: params
      }
    });

    setLastSignature(signature as string);
    return signature as string;

  } catch (error) {
    console.error(&#8217;Message signing failed:&#8217;, error);
    throw error;
  } finally {
    setIsLoading(false);
  }
};
</code></pre><h1>Step 5: User interface for step-up authentication</h1><p>Now for the final step! The user sees a simple, intuitive interface for authorizing high-risk or sensitive actions:</p><pre><code>// TransactionDemo.tsx - Complete UI for step-up authentication
const TransactionDemo: React.FC = () =&gt; {
  const { signMessage, isLoading, lastSignature } = useTransaction();
  const { isConnected } = useWalletConnect();
  const [message, setMessage] = useState(&#8217;Hello from ZTF Demo App!&#8217;);
  const [error, setError] = useState&lt;string | null&gt;(null);

  const handleSignMessage = async () =&gt; {
    if (!isConnected) {
      setError(&#8217;Please connect your wallet first&#8217;);
      return;
    }

    try {
      setError(null);
      await signMessage(message);
    } catch (err) {
      console.error(&#8217;Message signing failed:&#8217;, err);
      setError(err instanceof Error ? err.message : &#8216;Message signing failed&#8217;);
    }
  };

  if (!isConnected) {
    return (
      &lt;div style={{
        padding: &#8216;20px&#8217;,
        border: &#8216;1px solid #ddd&#8217;,
        borderRadius: &#8216;8px&#8217;,
        backgroundColor: &#8216;#f9f9f9&#8217;,
        marginTop: &#8216;20px&#8217;
      }}&gt;
        &lt;h3&gt;&#128274; Message Signing Demo&lt;/h3&gt;
        &lt;p&gt;Please connect your wallet to test message signing.&lt;/p&gt;
      &lt;/div&gt;
    );
  }

  return (
    &lt;div style={{
      padding: &#8216;20px&#8217;,
      border: &#8216;1px solid #ddd&#8217;,
      borderRadius: &#8216;8px&#8217;,
      backgroundColor: &#8216;#f9f9f9&#8217;,
      marginTop: &#8216;20px&#8217;
    }}&gt;
      &lt;h3&gt;&#9997;&#65039; Message Signing Demo&lt;/h3&gt;
      &lt;p&gt;Sign messages with your connected wallet (no transactions involved)&lt;/p&gt;

      &lt;div style={{ marginBottom: &#8216;15px&#8217; }}&gt;
        &lt;label style={{ display: &#8216;block&#8217;, marginBottom: &#8216;5px&#8217;, fontWeight: &#8216;bold&#8217; }}&gt;
          Message to Sign:
        &lt;/label&gt;
        &lt;textarea
          value={message}
          onChange={(e) =&gt; setMessage(e.target.value)}
          style={{
            width: &#8216;100%&#8217;,
            padding: &#8216;8px&#8217;,
            border: &#8216;1px solid #ccc&#8217;,
            borderRadius: &#8216;4px&#8217;,
            minHeight: &#8216;60px&#8217;,
            resize: &#8216;vertical&#8217;
          }}
          placeholder=&#8221;Enter your message here...&#8221;
        /&gt;
      &lt;/div&gt;

      &lt;div style={{ marginBottom: &#8216;15px&#8217; }}&gt;
        &lt;button
          onClick={handleSignMessage}
          disabled={isLoading || !message}
          style={{
            backgroundColor: isLoading ? &#8216;#ccc&#8217; : &#8216;#2196F3&#8217;,
            color: &#8216;white&#8217;,
            border: &#8216;none&#8217;,
            padding: &#8216;10px 20px&#8217;,
            borderRadius: &#8216;4px&#8217;,
            cursor: isLoading ? &#8216;not-allowed&#8217; : &#8216;pointer&#8217;,
            fontSize: &#8216;16px&#8217;,
            width: &#8216;200px&#8217;
          }}
        &gt;
          {isLoading ? &#8216;Signing...&#8217; : &#8216;Sign Message&#8217;}
        &lt;/button&gt;
      &lt;/div&gt;

      {error &amp;&amp; (
        &lt;div style={{
          marginBottom: &#8216;15px&#8217;,
          padding: &#8216;10px&#8217;,
          backgroundColor: &#8216;#ffebee&#8217;,
          border: &#8216;1px solid #f44336&#8217;,
          borderRadius: &#8216;4px&#8217;,
          color: &#8216;#c62828&#8217;
        }}&gt;
          &lt;strong&gt;Error:&lt;/strong&gt; {error}
        &lt;/div&gt;
      )}

      {lastSignature &amp;&amp; (
        &lt;div style={{
          marginTop: &#8216;15px&#8217;,
          padding: &#8216;10px&#8217;,
          backgroundColor: &#8216;#e8f5e8&#8217;,
          border: &#8216;1px solid #4caf50&#8217;,
          borderRadius: &#8216;4px&#8217;,
          color: &#8216;#2e7d32&#8217;
        }}&gt;
          &lt;strong&gt;&#9989; Message Signed!&lt;/strong&gt;
          &lt;div style={{
            marginTop: &#8216;8px&#8217;,
            wordBreak: &#8216;break-all&#8217;,
            fontFamily: &#8216;monospace&#8217;,
            fontSize: &#8216;12px&#8217;,
            backgroundColor: &#8216;white&#8217;,
            padding: &#8216;8px&#8217;,
            borderRadius: &#8216;4px&#8217;
          }}&gt;
            {lastSignature}
          &lt;/div&gt;
        &lt;/div&gt;
      )}
    &lt;/div&gt;
  );
};
</code></pre><h1>Authentication resources</h1><p><a href="https://www.nist.gov/cyberframework">NIST Cybersecurity Framework 2.0</a> explicitly recommends cryptographic authentication as the gold standard, meeting <a href="https://pages.nist.gov/800-63-3/sp800-63b.html#aal3reqs">AAL3 requirements</a>.</p><p><a href="https://owasp.org/Top10/">OWASP Top 10 2025 </a>lists &#8220;Broken Access Control&#8221; as the #1 web application security risk and &#8220;Authentication failures&#8221; as risk #7. Your ZTF implementation will give you the tools to mitigate these risks.</p><h1>Get started now: The complete checklist</h1><p><strong>Download the complete codebase</strong>: <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth">GitHub Repository</a></p><p><strong>Read the complete documentation: </strong><a href="https://documentation.ztf.solvewithvia.com/">ZTF Documentation</a></p><p><strong>Technical requirements</strong>: <a href="https://docs.walletconnect.network/wallet-sdk/overview">WalletConnect SDK</a>, <a href="https://www.keycloak.org/">Keycloak</a></p><p></p><h2>About the Author:</h2><p>Jesus Cardenes, VIA&#8217;s Senior Vice President, Product Architecture, is responsible for the technical roadmap and architectural design of all VIA products and its Web3 platform. He is known for his expertise in connecting technologies and platforms to create seamless user experiences. An interesting fact about Jesus is that he loves to cycle during the weekends with his kids!</p><div><hr></div><p>Ready to get started? The tutorial on <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth">GitHub</a> has everything you need to implement step-up authentication in minutes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth&quot;,&quot;text&quot;:&quot;Get started on GitHub&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-2-step-up-auth"><span>Get started on GitHub</span></a></p>]]></content:encoded></item><item><title><![CDATA[Making Zero Trust work for teams who actually ship code]]></title><description><![CDATA[George sets the record straight on Zero Trust, tackling the most common misconceptions.]]></description><link>https://www.viaknowledgehub.com/p/making-zero-trust-work-for-teams</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/making-zero-trust-work-for-teams</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Thu, 13 Nov 2025 17:12:26 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/178807874/19aad1e1821d67d121941abd191620df.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-ZGrsIidpfGY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;ZGrsIidpfGY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/ZGrsIidpfGY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p><a href="https://www.linkedin.com/in/georgefinney/">George Finney,</a> CISO at The University of Texas System and author of <em>Project Zero Trust</em>, asserts Zero Trust isn&#8217;t just a strategy, it&#8217;s the &#8220;<em>only</em> strategy when it comes to cybersecurity.&#8221;</p><p>Like all good researchers, we went straight to Reddit to see what people were really saying about Zero Trust. Turns out, a lot of teams were over it. They were tired of gatekeepers who slowed everyone down. Sure, plenty of Redditors could riff on principles like least privilege, but most were focused on what they already knew, not the bigger picture that makes Zero Trust not only work, but actually work seamlessly for teams shipping code under tight deadlines.</p><h2><strong>What Zero Trust is (and isn&#8217;t)</strong></h2><p>George sets the record straight on Zero Trust, tackling the most common misconceptions.</p><ol><li><p><strong>Zero Trust isn&#8217;t about not trusting people.</strong> Collaboration still matters. <a href="https://www.linkedin.com/in/john-kindervag-40572b1/">John Kindervaag,</a> the creator of Zero Trust, describes it as &#8220;a strategy for preventing or containing breaches by removing the trust relationships we have in digital systems.&#8221; Listen to <a href="https://youtube.com/shorts/9MtY54q_1u8?si=ALfdIQwGqRQkBSBp">John Kindervaag break down Zero Trust principles in 60 seconds</a>.</p></li><li><p><strong>It&#8217;s not a product you can buy. </strong>There&#8217;s no one-size-fits-all architecture. Zero Trust is a strategy, not a tool. If a vendor tells you they &#8220;do Zero Trust,&#8221; the real question is: how will they integrate, secure data, and prove they&#8217;re trustworthy?</p></li><li><p><strong>Least privilege is the how, Zero Trust is the what. </strong>Least privilege, separation of duties, and role-based access control are just building blocks. Zero Trust is the strategy that defines the desired end state.</p></li><li><p>The four Zero Trust design principles outlined in <em><a href="https://www.amazon.com/Project-Zero-Trust-Strategy-Aligning/dp/1119884845?ref_=ast_author_dp">Project Zero Trust</a></em> are simple, but powerful.</p><ol><li><p><em>&#8220;Define business outcomes.</em></p></li><li><p><em>Design from the inside out. Start with data.</em></p></li><li><p><em>Determine who or what needs access.</em></p></li><li><p><em>Inspect and log all traffic.&#8221;</em></p></li></ol></li><li><p><strong>You may already be asking &#8220;What can go wrong?&#8221; But what must go </strong><em><strong>right</strong></em><strong>?</strong> Security teams often use threat modeling to anticipate failures. Zero Trust requires teams to model the critical business success path: the systems, access, and safeguards that have to stay intact no matter what.</p></li><li><p><strong>Yes, Zero Trust can feel painful. But that&#8217;s a design problem, not a strategy problem.</strong>  If Zero Trust makes one team the bottleneck for every permission request, the issue isn&#8217;t Zero Trust, it&#8217;s poor automation and governance. Good Zero Trust reduces friction.</p></li><li><p><strong>Zero Trust and AI are inseparable. </strong>George uses a restaurant analogy: you have ingredients (data), recipes (models), system components (kitchen equipment), and end users (diners). You need to protect the ingredients, recipes, and different parts of the system. And diners should probably be kept out of the kitchen. If you think about AI this way, George says, it can help your focus on &#8220;securing trust relationships where different systems interact.&#8221;</p></li></ol><p><strong>About George Finney</strong></p><p><a href="https://www.linkedin.com/in/georgefinney/">George Finney</a> is the Chief Information Security Officer at the University of Texas System, Co-Chair of the CSO Strategic Advisory AI Safety Committee at the Cloud Security Alliance, and Founder of Well Aware Security. He is the author of multiple books, including:</p><ul><li><p><em><a href="https://www.amazon.com/Project-Zero-Trust-Strategy-Aligning/dp/1119884845?ref_=ast_author_dp">Project Zero Trust: A Story About a Strategy for Aligning Security and the Business </a></em>(Cybersecurity Canon Hall of Fame winner)</p></li><li><p><em><a href="https://www.amazon.com/Rise-Machines-Project-Trust-Story/dp/1394303718?ref_=ast_author_dp">Rise of the Machines: A Project Zero Trust Story</a></em></p></li><li><p><em><a href="https://www.amazon.com/Well-Aware-Master-Cybersecurity-Protect/dp/1966629001?ref_=ast_author_dp">Well Aware: Master the Nine Cybersecurity Habits to Protect Your Future</a></em></p></li><li><p><em><a href="https://www.amazon.com/More-Magic-Wands-George-Finney/dp/1535538929?ref_=ast_author_dp">No More Magic Wands</a></em></p></li></ul><p>George&#8217;s books skip the jargon and focus on stories. You might just find yourself rethinking Zero Trust and how it can help your team ship faster while keeping your organization and customers safe.</p><div><hr></div><h4><strong>Security AND ship faster? Yes, please. We built the easy button for military-grade authentication.</strong></h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try it free&quot;,&quot;action&quot;:null,&quot;class&quot;:&quot;button-wrapper&quot;}" data-component-name="ButtonCreateButton"><a class="button primary button-wrapper" href="https://github.com/viascience/ztf-tutorial"><span>Try it free</span></a></p>]]></content:encoded></item><item><title><![CDATA[Devs, your favorite metrics are holding you back]]></title><description><![CDATA[&#8220;You can&#8217;t measure that&#8221; is just business-speak for &#8220;we&#8217;re guessing and hoping nobody notices.&#8221;&#160;Doug Hubbard notices. And then he brings math. The kind that turns million-dollar guesswork into real decisions, and lets software teams prove they delivered value, not just code.]]></description><link>https://www.viaknowledgehub.com/p/devs-your-favorite-metrics-doug-hubbard</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/devs-your-favorite-metrics-doug-hubbard</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Thu, 30 Oct 2025 15:00:34 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/177536013/0d45fb8aff1451d8c725b0f2010f850f.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-LqOLlZtp9_I" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;LqOLlZtp9_I&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/LqOLlZtp9_I?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>&#8220;You can&#8217;t measure that&#8221; is just business-speak for &#8220;we&#8217;re guessing and hoping nobody notices.&#8221;</p><p>Doug Hubbard notices. And then he brings math. The kind that turns million-dollar guesswork into real decisions, and lets software teams prove they delivered value, not just code.</p><p>And security? Also measurable. Start with defining what security means for your product (most teams miss this step!). Then get resourceful on where you get the data you need to reduce uncertainty.</p><ul><li><p><strong>Measurement is about reducing uncertainty.</strong> One tiny drop in uncertainty can change a million-dollar decision.</p></li><li><p><strong>Developers love measuring speed&#8230; but speed by itself is often the least important thing.</strong> Ask questions like:</p><ul><li><p>Did it create value?</p></li><li><p>Did it cost us more in fixes than it saved in speed?</p></li><li><p>Should we repeat, adjust, or stop investing in this feature?</p></li></ul></li><li><p><strong>If someone says &#8220;that&#8217;s impossible to measure,&#8221; spoiler: it&#8217;s 100% measurable. </strong>Doug says, &#8220;you already have more data than you think, and you need way less data than you assume.&#8221;</p></li><li><p><strong>Spend more time planning for how you will leverage AI.</strong> Doug advises, &#8220;Spend more time thinking about where AI is going and options for ways you can use it.&#8221; In fact, one of the best ways you can use AI is to brainstorm and model thousands of alternative solutions.</p></li><li><p><strong>Security isn&#8217;t a vibe. It&#8217;s measurable. </strong>Breach databases, vulnerability scores, and near-miss data are just a few examples of hard evidence hiding in plain sight. Doug recommends starting out with Cyentia Institute&#8217;s Information Risk Insights Study (IRIS) and Verizon&#8217;s Data Breach Investigations report.</p></li><li><p><strong>Simple math beats expert intuition again and again.</strong> Basic statistical models often outperform seasoned pros when choosing what to build or what to fix.</p></li><li><p><strong>The first step for any developer: ask &#8220;What decision will this metric change?&#8221; </strong>If the metric doesn&#8217;t change a decision, it&#8217;s just noise.</p></li></ul><h2>About Doug Hubbard</h2><p><a href="https://www.linkedin.com/in/dwhubbard/">Doug Hubbard</a> grew up in a small rural town, became a Captain in the Army National Guard, and went on to build a career solving one of the hardest problems in business: measuring the things everyone else says can&#8217;t be measured. He&#8217;s the inventor of Applied Information Economics, founder of Hubbard Decision Research, and the guy companies call when they need to reduce uncertainty in the most uncertain environments. Doug literally makes the immeasurable&#8230; measurable.</p><p>Doug is the author of:</p><ul><li><p><em><a href="https://www.amazon.com/How-Measure-Anything-Project-Management/dp/1394239815/ref=books_amazonstores_desktop_mfs_aufs_ap_sc_dsk_0?_encoding=UTF8&amp;pd_rd_w=W0mVL&amp;content-id=amzn1.sym.299f645c-0a78-440a-94a2-fb482e7cb326&amp;pf_rd_p=299f645c-0a78-440a-94a2-fb482e7cb326&amp;pf_rd_r=143-5097382-5161257&amp;pd_rd_wg=dCpNB&amp;pd_rd_r=b2b7eed5-ae02-4488-a2be-61f3db10cd50">How to Measure Anything in Project Management</a></em></p></li><li><p><em><a href="https://www.amazon.com/How-Measure-Anything-Intangibles-Business/dp/1118539273/ref=books_amazonstores_desktop_mfs_aufs_ap_sc_dsk_3?_encoding=UTF8&amp;pd_rd_w=W0mVL&amp;content-id=amzn1.sym.299f645c-0a78-440a-94a2-fb482e7cb326&amp;pf_rd_p=299f645c-0a78-440a-94a2-fb482e7cb326&amp;pf_rd_r=143-5097382-5161257&amp;pd_rd_wg=dCpNB&amp;pd_rd_r=b2b7eed5-ae02-4488-a2be-61f3db10cd50">How to Measure Anything: Finding the Value of Intangibles in Business</a></em></p></li><li><p><em><a href="https://www.amazon.com/Failure-Risk-Management-Why-Broken/dp/111952203X?ref_=ast_author_dp&amp;th=1&amp;psc=1&amp;dib=eyJ2IjoiMSJ9.iqy-iFKa8Zn-3JpP1UpDnANr346gbPxLBY1qBkIdwYOOEQC-8thVsvqpAq57jeFbW38xUtUHeCtTAXZXvFKueWItKgX79IcHGllSMV9BN_RSiXs3AuxPlaBEllJvI6oM.E7yVm0rANMSmsPyP2DiD0qXdLr357wqIfxdfEqOGbPI&amp;dib_tag=AUTHOR">The Failure of Risk Management: Why It&#8217;s Broken and How to Fix It</a></em></p></li><li><p><em><a href="https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1119892309/ref=tmm_hrd_swatch_0?_encoding=UTF8&amp;dib_tag=AUTHOR&amp;dib=eyJ2IjoiMSJ9.qAycvrJI0z9Qx06n3Ko93exg3hHDaWFpeyzkFA7b4ObmdBc-DYupugt-yoXxRPzc62U_nfz3HnUcpvJzHc6LpWZ84uUkCj2F11Z9ZF-2B0N9HBDS3Em9e4yey-RtQTlhrXmSmbNYsxQ9Ea7IxthyVJS2SKFpIa_hEUKp5P9rPWsBFStah4gzvsdg9AYzgxmevtwpKmdh4jQWzLH-BX5Zfw.jxazs8DRN2zIqXRuqQu1pVRAa4tfg4BLa4xvlDP49H8">How to Measure Anything in Cybersecurity Risk</a></em></p></li><li><p><em>Pulse: The New Science of Harnessing Internet Buzz to Track Threats and Opportunities</em></p></li></ul><div><hr></div><h4><strong>Dread authentication setup? Not anymore.</strong> Authentication in 5 Minutes. (No seriously, we timed it.)</h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial&quot;,&quot;text&quot;:&quot;Try it free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial"><span>Try it free</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[How I built enterprise authentication with agentic coding ]]></title><description><![CDATA[Vibe-coding in Cursor is great&#8230;but what about secure authentication?&#160;This tutorial shows how to combine VIA's Zero Trust Fabric with Keycloak and agentic coding in Cursor to build secure, passwordless login in minutes.]]></description><link>https://www.viaknowledgehub.com/p/how-fast-can-you-build-passwordless-login-with-agentic-coding</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/how-fast-can-you-build-passwordless-login-with-agentic-coding</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Fri, 24 Oct 2025 19:41:11 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/e7a89f14-483e-4534-9ebf-97131d205a8b_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="native-video-embed" data-component-name="VideoPlaceholder" data-attrs="{&quot;mediaUploadId&quot;:&quot;90ae0e6b-dc07-42cf-b714-84d8bd4df966&quot;,&quot;duration&quot;:null}"></div><p>Vibe-coding in Cursor is great&#8230;but what about <em>secure authentication</em>?</p><p>In this tutorial, we&#8217;ll show you how VIA&#8217;s Zero Trust Fabric, Supabase, Keycloak, and agentic coding in Cursor can build secure, passwordless login in minutes.</p><p>You&#8217;ll see how AI-driven development can plan, build, and test a secure app without sacrificing control or compliance.</p><p>Users scan a QR code, log in, and they are instantly authenticated. No passwords. No trade-offs.</p><p>And you? You can get back to building.</p><p>Watched the video?  Now <strong>try it yourself for free</strong>. The <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-1-Passwordless-Cursor">tutorial on GitHub</a> has everything you need to ship passwordless auth in minutes.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://github.com/viascience/ztf-tutorial/tree/master/tutorial-1-Passwordless-Cursor&quot;,&quot;text&quot;:&quot;Try it for free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-1-Passwordless-Cursor"><span>Try it for free</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Top three mobile security fails (and how to fix them)]]></title><description><![CDATA[Mobile app security expert Andrew Hoog breaks down the top &#8220;gotcha&#8221; moments for mobile developers and the quick, actionable steps your team can take to secure your apps and protect your users.]]></description><link>https://www.viaknowledgehub.com/p/top-three-mobile-security-fails-and-fixes</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/top-three-mobile-security-fails-and-fixes</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Wed, 15 Oct 2025 14:14:24 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/176193500/6f93a108afcad8ba2c87e82cbb281235.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-4p7mTw1qjbs" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;4p7mTw1qjbs&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/4p7mTw1qjbs?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Think Apple and Google are doing deep security reviews of your app? Think again.</p><p>While the App Store and Google Play scan for known malware, they completely miss big security gaps like API misconfigurations and vulnerabilities in third-party tools. Mobile app security expert <a href="https://www.linkedin.com/in/andrewhoog/">Andrew Hoog</a> breaks down the top &#8220;gotcha&#8221; moments for mobile developers and the quick, actionable steps your team can take to secure your apps and protect your users.</p><h1>Top three mobile security fails</h1><ol><li><p><strong>Skipping security reviews. </strong>Most teams either skip security reviews or use tools built for web apps. But web app scanners miss a whole range of mobile-specific vulnerabilities.</p></li><li><p><strong>Using sketchy third-party SDKs.</strong> Andrew estimates 60&#8211;70% of vulnerabilities come from free, well-documented SDKs, which are &#8220;like catnip&#8221; for developers. These can send unencrypted data, use weak keys, or leak user data to foreign entities.</p></li><li><p><strong>Ignoring AI risks.</strong> You, or the SDKs you rely on, might be using personally identifiable information (PII) in ways that break privacy laws, violate contracts, or erode user trust.</p></li></ol><h1>What you can do today</h1><ol><li><p><strong>Get the right tools.</strong> Use security tools built for mobile apps. Andrew recommends:</p><ul><li><p><a href="https://www.nowsecure.com/radare/">Radare</a> (open-source reverse engineering toolkit, binary and static analysis)</p></li><li><p><a href="https://www.nowsecure.com/frida/">Frida</a> (open-source dynamic instrumentation toolkit)</p></li><li><p>Both have great documentation to get you started.</p></li></ul></li><li><p><strong>Involve your team and stakeholders.</strong> Try <a href="https://www.nowsecure.com/marc-app/">NowSecure&#8217;s Mobile Application Risk Checker</a>. It reports on sensitive data, privacy declarations, and network connections. Your app might already be listed! Start including <a href="https://www.nowsecure.com/mobile-app-breach-news/">mobile app security and privacy risks</a> in your threat intel program.</p></li><li><p><strong>Leverage free learning resources.</strong> Explore <a href="https://mas.owasp.org/">OWASP Mobile Application Security</a>, <a href="https://academy.nowsecure.com/">NowSecure Academy</a>, or tools like Claude for contextual security insights.</p></li></ol><h2>About Andrew Hoog</h2><p><a href="https://www.linkedin.com/in/andrewhoog/">Andrew Hoog</a> is a developer&#8217;s go-to security person. He&#8217;s been in the trenches of mobile security and forensics for over a decade, building, breaking, and securing apps long before it was cool.</p><p>He co-founded <a href="https://www.nowsecure.com/">NowSecure</a>, wrote two books on mobile forensics and security, and holds three patents in the field. When he&#8217;s not deep in code or court (he&#8217;s also an expert witness in U.S. Federal Courts), he&#8217;s helping shape the future of mobile app security at NowSecure.</p><p>Andrew&#8217;s mission? Help developers build apps that are not just awesome but are secure by design.</p><div><hr></div><h4>See how VIA&#8217;s <strong>Zero Trust Fabric</strong> delivers military-grade authentication.</h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/via-ztf/&quot;,&quot;text&quot;:&quot;Try it free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/via-ztf/"><span>Try it free</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[A dev’s guide to navigating ATO]]></title><description><![CDATA[A long and winding road to Authorization to Operate (ATO) made easy.]]></description><link>https://www.viaknowledgehub.com/p/a-devs-guide-to-navigating-ato</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/a-devs-guide-to-navigating-ato</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Wed, 08 Oct 2025 17:59:25 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!7zMj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!7zMj!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!7zMj!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!7zMj!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!7zMj!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!7zMj!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!7zMj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:73228,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/175635083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!7zMj!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!7zMj!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!7zMj!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!7zMj!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd287ae78-7821-4d92-a876-afe6733a6bf4_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p><code>What&#8217;s inside:</code></p><ul><li><p><code>&#8220;A long and winding road to ATO made easy&#8221;</code></p></li><li><p><code>&#65279;&#65279;Resources: Iron Bank (secure container image repository) documentation, National Vulnerability Database (NVD)</code></p></li><li><p><code>Take note: Governance, risk, and compliance (GRC) engineering explained, Cybersecurity Risk Management Construct to replace Risk Management Framework, and don&#8217;t miss an interview with Dave Raley, Digital Program Manager at Marine Corps Community Services (MCCS) and pioneer of DevSecOps platform Operation Stormbreaker</code></p></li></ul><h1>A long and winding road to ATO made easy</h1><p>You&#8217;ve built a prototype. It&#8217;s brilliant. It could transform national security missions.</p><p>But there&#8217;s one roadblock standing in the way. Three big letters: ATO.</p><p>As Dave Raley, Digital Program Manager at Marine Corps Community Services (MCCS), explains: ATO, Authorization to Operate, means &#8220;getting a system authorized to run in production in the government.&#8221;</p><p>It&#8217;s designed to manage risk, enforce strict security standards, and ultimately requires a designated authorizing officer (AO) to sign off before anything goes live.</p><p><em>Dave Raley, pioneer of Operation Stormbreaker, shares how the DevSecOps platform accelerates missions and gets software to market faster in <a href="https://www.viaknowledgehub.com/p/a-tale-of-two-atos">&#8220;A Tale of Two ATOs&#8221;</a> on the VIA Knowledge Hub podcast.</em></p><p>The ATO process can seem like a black hole. It can drain years and millions, with processes buried in paperwork, static snapshots, and frustration.</p><h2>Use a DevSecOps platform that already has an ATO</h2><p>We caught up with two seasoned VIAneers, <a href="https://www.linkedin.com/in/ashleydasilva/">Ashley DaSilva</a>, Vice President, Applications, and <a href="https://www.linkedin.com/in/jesus-alejandro-cardenes-cabre/">Jesus Cardenes</a>, Senior Vice President, Product Architecture, who offered the ultimate pro-tip:</p><blockquote><p><strong>Use a DevSecOps platform built for ATO.</strong></p></blockquote><ul><li><p>The platform already has its own ATO that covers many of the infrastructure security requirements your application would have to address, anyway.</p></li><li><p>Your applications inherit the platform&#8217;s approval when they run on it.</p></li><li><p>Security reviews happen through the platform.</p></li><li><p>The platform acts as a liaison between your team and the AO.</p></li><li><p>While you still need to continuously address application security, your application can run on the DevSecOps platform indefinitely.</p></li></ul><p><strong>The result: </strong>faster approvals, less frustration, and more time to focus on building your products.</p><h2>Make the most of the DevSecOps platform</h2><p>Here are Ashley and Jesus&#8217;s tips for managing stakeholder expectations and making the most of your experience with the DevSecOps platforms you use:</p><ol><li><p><strong>Manage release timeline expectations. </strong>The ATO process stretches timelines for big releases (architecture changes, new external data connections, etc.). Instead of two- or three-week sprints like in commercial software, expect closer to ten weeks before deployment.</p></li><li><p><strong>Shift left. </strong>Think security-first, from the first step to the last. Establish a process to continuously scan for and address common vulnerabilities and exposures (CVEs) as part of every sprint so changes don&#8217;t introduce nasty surprises. &#8220;We can plan for CVEs as a part of every sprint,&#8221; says Ashley, &#8220;and determine if making a change introduces something unexpected.&#8221; Added bonus: this prep can turbocharge the ATO process.</p></li><li><p><strong>Stay agile with intentional architecture design. </strong>Major architecture changes take longer to clear the ATO process. Build a solid foundation upfront, so smaller features and security pushes can glide through the process much faster. With continuous scanning already in place, you&#8217;ll speed up the ATO process dramatically.</p></li><li><p><strong>Stay lean.</strong> Containerize your solution and build on top of secure and lean base images. Start by using hardened base images with minimal vulnerabilities. Choose third-party software carefully, as you inherit their vulnerabilities. Check out <a href="https://www.viaknowledgehub.com/p/a-devs-guide-to-hacking-dod-compliance">&#8220;A dev&#8217;s guide to hacking DoD compliance&#8221;</a> for five more helpful tips.</p></li><li><p><strong>Where possible, design stateless software. </strong>Not storing any prior interaction data, or &#8220;state,&#8221; between requests makes software scalable, resilient, and more secure.</p></li></ol><p>With security built in from the start, lean practices, and DevSecOps platforms tailored for ATO, teams can move from paperwork purgatory to rapid, secure deployment.</p><h1>Need to know</h1><p><em>You have pressing compliance questions&#8230;we have answers. So you can build faster and get back to shipping. Check out the resources below.</em></p><p><strong><a href="https://docs-ironbank.dso.mil/faq/">Iron Bank documentation</a></strong></p><p>Even if you don&#8217;t use Iron Bank (the secure container image repository part of the U.S. Air Force&#8217;s Platform One DevSecOps ecosystem) it&#8217;s still worth exploring the documentation. It&#8217;s a great window into how defense and other high-assurance environments think about container hardening and supply chain security. Start with the FAQ to get the big picture, then dive into &#8220;Getting Started.&#8221;</p><p></p><p><strong><a href="https://nvd.nist.gov/">National Vulnerability Database (NVD)</a></strong></p><p>Most vulnerability scanners point you here for the details, and for good reason. Maintained by the National Institute of Standards and Technology (NIST), the NVD is the go-to hub for tracking and understanding known CVEs. Keep it bookmarked; you&#8217;ll visit it more than you think.</p><h1>Take note</h1><p><em>With all the information swirling around, it&#8217;s hard to know where to focus. Don&#8217;t worry, we&#8217;ve sorted through current headlines, insights, and events and handpicked what should be on your radar for the week.</em></p><h3>Worth your time</h3><p><strong><a href="https://www.youtube.com/watch?v=cR3x4YBTPdQ">What is GRC Engineering?</a></strong></p><p>Watch this short video to see why GRC engineering is definitely not just about paperwork. Instead, governance, risk, and compliance engineering ensures a system&#8217;s security is continuously monitored, measured, and improved.</p><div id="youtube2-cR3x4YBTPdQ" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;cR3x4YBTPdQ&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/cR3x4YBTPdQ?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>This just happened</h2><p><strong><a href="https://www.war.gov/News/Releases/Release/Article/4314411/department-of-war-announces-new-cybersecurity-risk-management-construct/">Cybersecurity Risk Management Construct</a></strong></p><p>The Department of War announced the new Cybersecurity Risk Management Construct (CSRMC) will replace the previous Risk Management Framework (RMF). The CSRMC emphasizes continuous monitoring, as opposed to point-in-time snapshots. It champions DevSecOps, with automation baked in. CSRMC runs across 5 phases: Design, Build, Test, Onboard, and Operations.</p><h2>Don&#8217;t miss this</h2><p>What if it took just fifteen minutes to get your system authorized (ATO) to run in production in the government? For <a href="https://www.linkedin.com/in/daveraley/">Dave Raley</a>, that&#8217;s not just a dream. He&#8217;s making it a reality.</p><p>In our <a href="https://www.viaknowledgehub.com/p/a-tale-of-two-atos">latest podcast episode</a>, Dave Raley, Digital Program Manager at Marine Corps Community Services (MCCS), reveals how Operation StormBreaker is transforming the government&#8217;s ATO process.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!JxiR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!JxiR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!JxiR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!JxiR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!JxiR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!JxiR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:53047,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/175635083?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!JxiR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!JxiR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!JxiR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!JxiR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1086b88e-8e7d-40cc-b48f-038b858a7a44_1456x1048.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><h4>See how VIA&#8217;s <strong>Zero Trust Fabric</strong> delivers military-grade authentication.</h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/via-ztf/&quot;,&quot;text&quot;:&quot;Try it free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/via-ztf/"><span>Try it free</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.viaknowledgehub.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to our newsletter to be the first to get access to exclusive live webinars, expert Q&amp;A's, and other invite-only events.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[A tale of two ATOs]]></title><description><![CDATA[With Dave Raley, Digital Program Manager at Marine Corps Community Services (MCCS)]]></description><link>https://www.viaknowledgehub.com/p/a-tale-of-two-atos</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/a-tale-of-two-atos</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Tue, 30 Sep 2025 21:51:33 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/174962740/6882df2ba17f78941227589c1d225609.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div id="youtube2-UaC4KUTahpc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;UaC4KUTahpc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/UaC4KUTahpc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Getting an <strong>Authorization to Operate (ATO)</strong> can be a slow and expensive hurdle for developers trying to deploy software for the government. In this episode, <a href="https://www.linkedin.com/in/daveraley/">Dave Raley</a>, Digital Program Manager at Marine Corps Community Services (MCCS), explains how he&#8217;s revolutionizing this process with <strong><a href="https://operationstormbreaker.usmc-mccs.org/">Operation StormBreaker</a></strong>. Instead of a months-long process, StormBreaker provides a pre-authorized DevSecOps platform that allows mission owners and contractors to deploy their code into production in as little as <strong>15 minutes</strong>. </p><p>By shifting from a traditional &#8220;checklist&#8221; mindset to one of continuous risk assessment, StormBreaker focuses on the ultimate goal: securely and resiliently delivering mission-critical capabilities.</p><h3><strong>Key Takeaways</strong></h3><ul><li><p><strong>Stormbreaker is an alternative to an old checklist model.</strong> The traditional Risk Management Framework (RMF) acts like a static checklist. StormBreaker takes a more modern approach, one underscored in the recently-released Cybersecurity Risk Management Construct, and uses advanced tooling to continuously monitor the software&#8217;s actual risk posture at any given moment.</p></li><li><p><strong>Focus on outcomes.</strong> The most important question isn&#8217;t &#8220;Did we complete the checklist?&#8221; but rather, &#8220;Did we get a secure and resilient workload into production?&#8221; Understand the pain point before trying to build a solution.</p></li><li><p><strong>Contractors can&#8217;t get an ATO alone.</strong> A commercial company is always dependent on its government partner to secure an ATO.</p></li><li><p><strong>Ask early, ask often.</strong> Software teams should ask their mission owners right away, &#8220;What&#8217;s the plan to get this into production?&#8221; That exposes roadblocks before time and money disappear.</p></li></ul><p><strong>About Dave Raley</strong></p><p>Ever wonder how some leaders just <em>get</em> it when it comes to modernizing big organizations? Then you need to meet <a href="https://www.linkedin.com/in/daveraley/">Dave Raley</a>, who has been with the Marine Corps as a civilian since 2010. Dave is the Digital Program Manager at Marine Corps Community Services (MCCS) and he totally transformed how Marines and their families get services.</p><p>But here&#8217;s the best part: he didn&#8217;t just <em>manage</em> change, he <em>ignited</em> it. Dave actually founded MCCS&#8217;s innovation capability and launched their whole customer experience (CX) strategy.</p><p>He pioneered something called <strong><a href="https://operationstormbreaker.usmc-mccs.org/">Operation StormBreaker</a></strong>. Why? To cut down on software development headaches, save money, and get critical missions done faster. And get this: StormBreaker is gaining traction beyond MCCS, making secure cloud deployments scalable for services across national security.</p><p><strong>Like this podcast episode? We&#8217;d love if you shared it!</strong></p><div><hr></div><h4>Building software for the DoD shouldn&#8217;t be a constant battle with access. We know, because we&#8217;ve been there. We built VIA&#8217;s Zero Trust Fabric to fix all that. </h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/ztf-platform/&quot;,&quot;text&quot;:&quot;Try it for free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/ztf-platform/"><span>Try it for free</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[A dev’s guide to post-quantum cryptography (PQC)]]></title><description><![CDATA[Quantum computers could break today&#8217;s encryption by 2030. Learn five steps developers can take now to prepare for the post-quantum era.]]></description><link>https://www.viaknowledgehub.com/p/a-devs-guide-to-post-quantum-cryptography</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/a-devs-guide-to-post-quantum-cryptography</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Wed, 24 Sep 2025 22:18:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!rH_u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rH_u!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rH_u!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!rH_u!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!rH_u!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!rH_u!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rH_u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:45837,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/174486726?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rH_u!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!rH_u!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!rH_u!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!rH_u!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4f539b03-4d82-4ca2-b4c9-9c309d2ec77e_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><code>What&#8217;s inside:</code></p><ul><li><p><code>Party like it&#8217;s Y2Q, then do these five things</code></p></li><li><p><code>&#65279;&#65279;Resources: NIST Post Quantum Cryptology Standards, the Biden administration&#8217;s memo on quantum to establish US superiority and ensure security, and a handy post-quantum cryptography roadmap</code></p></li><li><p><code>Take note: IBM Fellow Jerry Chow makes quantum make sense, an exclusive interview with Dave Raley, who will help you get your prototype to market faster</code></p></li></ul><h1>Party like it&#8217;s Y2Q, but first do these five things</h1><p>Countdowns usually end with fireworks, champagne, or at least a deployment that doesn&#8217;t break prod. But the Cloud Security Alliance&#8217;s (CSA) <a href="https://cloudsecurityalliance.org/research/working-groups/quantum-safe-security/">&#8220;Countdown to Y2Q&#8221;</a> aka &#8220;<em>the countdown to quantum destruction&#8221; </em>isn&#8217;t exactly party vibes. Their forecast? By 2030, quantum computers will rip through today&#8217;s encryption and all we&#8217;ll end up with is a broken padlock emoji &#128275;(which, let&#8217;s be real, doesn&#8217;t even look that broken).</p><h3><strong>Why you should care: encryption is going, going, gone</strong></h3><p>Why should you care? Algorithms we&#8217;ve leaned on for decades (RSA, ECC, etc.) go from &#8220;mathematically solid&#8221; to &#8220;sand castle at high tide&#8221; once quantum shows up. We&#8217;re talking minutes to crack, not months or years.</p><p>Where does that leave your organization? With two missing features:</p><ul><li><p><strong>No confidentiality</strong>: everything you thought was private is now basically a public repository.</p></li><li><p><strong>No integrity</strong>: you can&#8217;t trust that a website, email, machine, or file is what it claims to be or that it hasn&#8217;t been mangled in transit.</p></li></ul><p>And sure, that CSA clock says we&#8217;ve got a few years left to procrastinate. But here&#8217;s the kicker: the problem isn&#8217;t just &#8220;future you.&#8221; It&#8217;s happening <em>right now</em>.</p><p>Ever heard of <strong>harvest now, decrypt later</strong>? Bad actors are hoarding your encrypted data like the junior devs stuffing their hoodies with office snacks, waiting for the quantum commute to dig in. At your company&#8217;s expense. &#127850;</p><blockquote><p><strong>FYI</strong>: The Quantum Computing Cybersecurity Preparedness Act (QCCSP) tasks the U.S. Office of Management and Budget with prioritizing moving federal IT systems to quantum-resistant cryptography. And the National Security Agency (NSA) has directed the Defense Information Systems Agency (DISA) to make sure that post-quantum cryptography rolls out in national security IT systems by 2035.</p></blockquote><p><strong>Here are a few terms worth noting:</strong></p><h5><strong>Quantum computing</strong></h5><p>Think of quantum computing like an octopus: the &#8220;brain&#8221; has a sense of the problem, while the tentacles work through different answers <em>all at the same time</em>. Parallel brute-force, but squishier and cuter. (Also, if you&#8217;ve read Adrian Tchaikovsky&#8217;s <em><a href="https://www.amazon.com/Children-Ruin-Time-Novels/dp/1509865853">Children of Ruin</a></em>, you already know octopi are smarter than us and are just one pandemic away from running the planet.)</p><h5><strong>Qubit</strong></h5><p>Sounds like a sugary cereal or off-brand Lego set, but it&#8217;s the basic unit of quantum computing. Classical bits are 0 <em>or</em> 1. Qubits can be <a href="https://www.youtube.com/watch?v=QuR969uMICM">0, 1, </a><em><a href="https://www.youtube.com/watch?v=QuR969uMICM">or</a></em><a href="https://www.youtube.com/watch?v=QuR969uMICM"> a little bit of 0 and 1 at the same time</a> (also known as superposition). Let the fun begin!</p><h5><strong>Post-Quantum Cryptography (PQC)</strong></h5><p>The set of new algorithms NIST is rolling out to replace the soon-to-be-broken classics (RSA, ECC, etc.). You&#8217;ll see terms like <em>quantum-safe, quantum-secure, quantum-resistant,</em> which all essentially mean the same thing. But note that <em><a href="https://www.nist.gov/cybersecurity/what-quantum-cryptography">quantum cryptography</a></em> actually refers to something different, cryptography made possible by quantum mechanics.</p><h5><strong>Crypto-agility (or algorithm agility)</strong></h5><p>Think of it like swapping your phone case: the old cracked one comes off, a shiny new one goes on, and your trusty phone keeps working just fine. <a href="https://csrc.nist.gov/projects/crypto-agility">Crypto-agility is crucial for post-quantum cryptography</a>. It allows today&#8217;s algorithms to be swapped with tomorrow&#8217;s quantum-resistant ones without a big overhaul.</p><p>And now, what you&#8217;ve all been waiting for, a to-do list!</p><h2>Five things developers can do today</h2><ol><li><p><strong>Create an inventory of all classical cryptography methods.</strong> Don&#8217;t forget about third-party vendors. Roll up your sleeves and roll out that spreadsheet.</p></li><li><p><strong>Bookmark standards and track PQC release schedules</strong>. VIA&#8217;s development team recommends checking out <a href="https://csrc.nist.gov/pubs/ir/8547/ipd">NIST IR 8547</a> and <a href="https://openssl-library.org/post/2025-04-08-openssl-35-final-release/">OpenSSL</a>.</p></li><li><p><strong>Start experimenting with post-quantum cryptography libraries </strong><em><strong>now</strong></em><strong>.</strong> They&#8217;re still under development, so they are still evolving. But you should prepare yourself for larger keys and signatures (not to mention other unknowns), which will impact storage, bandwidth, and processing time.</p></li><li><p><strong>Remember crypto-agility from your vocab lesson earlier?</strong> Bake crypto-agility into your engineering and appsec processes. Get leadership on board because you&#8217;ll need their support.</p></li><li><p><strong>Plan for hybrid: both classical and post-quantum algorithms side-by-side. </strong>VIA referenced Commercial National Security Algorithm (CNSA) Suite 2.0 guidelines and identified applications of each algorithm within VIA&#8217;s applications. Since PQC security libraries are not widely adopted or battle-tested (yet), VIA uses a hybrid approach. In other words, VIA integrates PQC with today&#8217;s classical algorithms.</p></li></ol><blockquote><p><strong>Have questions about PQC security libraries? </strong>VIA engineers have been there, done that. Drop your questions in the comments or reply to this newsletter.</p></blockquote><h1>Need to know</h1><ol><li><p><strong><a href="https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization">NIST Post Quantum Cryptology Standards</a></strong></p><p>Quantum is nothing new to the National Institute of Standards and Technology (NIST). The agency has already published a handful of PQC standards and reference guides.</p><p></p></li><li><p><strong><a href="https://irp.fas.org/offdocs/nsm/nsm-10.pdf">National Security Memorandum on Promoting United States Leadership in Quantum Computing While Mitigating Risks to Vulnerable Cryptographic Systems</a></strong></p><p>The Biden Administration jump-started the federal government&#8217;s earnest attempt to safeguard the U.S. in a post-quantum cryptographic world, signing the Quantum Cybersecurity Preparedness Act in late 2021, then quickly issued National Security Memo (NSM) 10 to &#8220;identify key steps needed to maintain the Nation&#8217;s competitive advantage in quantum information science (QIS), while mitigating the risks of quantum computers to the Nation&#8217;s cyber, economic, and national security.&#8221; The memorandum laid out specific actions that agencies must follow in what the administration said would be a &#8220;multi-year process of migrating vulnerable computer systems to quantum-resistant cryptography.&#8221;</p><p></p></li><li><p><strong><a href="https://pqcc.org/post-quantum-cryptography-migration-roadmap/">Post-quantum cryptography migration roadmap</a></strong></p><p>A high-level, easy-to-share survival guide for swapping out today&#8217;s breakable algorithms with quantum-safe algorithms, without breaking your systems. Four steps: prep, inventory, plan/execute, and keep watching, because quantum will be keeping you on your toes.</p></li></ol><h1>Take note</h1><p><em>With all the information swirling around, it&#8217;s hard to know where to focus. Don&#8217;t worry. We&#8217;ve sorted through current headlines, insights, and events and handpicked what should be on your radar for the week.</em></p><h2>Worth your time</h2><p><strong><a href="https://www.youtube.com/watch?v=-o0fiD-M34M">IBM&#8217;s Quantum Director Talks AI, Breaking Crypto, Basics of Quantum</a></strong><a href="https://www.youtube.com/watch?v=-o0fiD-M34M"> (Video)</a></p><div id="youtube2--o0fiD-M34M" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-o0fiD-M34M&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-o0fiD-M34M?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Matthew Berman sits down with IBM Fellow Jerry Chow, who somehow makes quantum computing make sense. Chow breaks down how quantum can shred today&#8217;s encryption, how quantum-safe protocols keep us secure, and where AI and quantum might take us next.</p><h2>This just happened</h2><p><strong><a href="https://www.captechu.edu/blog/mitigating-quantum-computing-threats-to-cybersecurity">&#8220;Mitigating Cybersecurity Threats and Preparing for a Quantum-Driven Landscape&#8221;</a></strong>from CAPTECHU</p><p>Why should post-quantum cryptography steal all the spotlight? PQC is basically Luke Skywalker staring down the quantum Death Star, but even Luke needs backup. Like everything in security, it&#8217;s about layers: you lock the blast doors, place a team of Chewbacca&#8217;s in the hallway, and get a few blaster rifles. This article outlines why defense in depth is critical, and how decentralization is a key part of the rebel alliance.</p><h2>Don&#8217;t miss this</h2><p>Meet <strong><a href="https://www.linkedin.com/in/daveraley/">Dave Raley</a></strong>, the mind behind <em><a href="https://operationstormbreaker.usmc-mccs.org/">Operation Stormbreaker</a></em> and Digital Program Manager at <strong>Marine Corps Community Services (MCCS)</strong>.</p><p>If you&#8217;ve ever wondered how to take a software prototype from idea to market faster, Dave&#8217;s the one you want in your corner. &#128640;</p><p>Stay tuned next week!</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!_Zh_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!_Zh_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!_Zh_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!_Zh_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!_Zh_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!_Zh_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:53047,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/174486726?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!_Zh_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!_Zh_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!_Zh_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!_Zh_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3cce16a-e51f-4b6e-b984-2b346a125283_1456x1048.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Building software for the DoD shouldn&#8217;t be a constant battle with access. We know, because we&#8217;ve been there. We built VIA&#8217;s Zero Trust Fabric to fix all that.</h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/ztf-platform/&quot;,&quot;text&quot;:&quot;Try it free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/ztf-platform/"><span>Try it free</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.viaknowledgehub.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to our newsletter to be the first to get access to exclusive live webinars, expert Q&amp;A&#8217;s, and other invite-only events.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[How I built military-grade authentication in five minutes]]></title><description><![CDATA[What if enterprise-grade security didn&#8217;t need passwords? Zero Trust Fabric makes it possible. And yes&#8230;setup takes less than five minutes.]]></description><link>https://www.viaknowledgehub.com/p/authentication-in-five-minutes</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/authentication-in-five-minutes</guid><dc:creator><![CDATA[Jesus Cardenes]]></dc:creator><pubDate>Tue, 23 Sep 2025 15:00:00 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!-Ql9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!-Ql9!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!-Ql9!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!-Ql9!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!-Ql9!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!-Ql9!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!-Ql9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:63324,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/173724263?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!-Ql9!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!-Ql9!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!-Ql9!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!-Ql9!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0a36717c-e037-444b-a2bc-a60fe2b00982_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div class="pullquote"><p>Prefer to jump in and get started? Get everything you need on <a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-1-Passwordless">GitHub</a>.</p></div><p>In a world where security breaches are a constant threat and user trust is critical, building a secure authentication system is no longer optional. This is especially true for highly regulated industries like defense and energy, where a single vulnerability can lead to catastrophic consequences.</p><p>In addition, when it comes to designing access in highly regulated environments, you can waste weeks on compliance challenges and still not get it right.</p><p>That&#8217;s exactly why we built VIA&#8217;s <strong><a href="https://www.solvewithvia.com/ztf-platform/">Zero Trust Fabric (ZTF)</a></strong>. ZTF came to life because VIA needed a trustworthy way to manage keys in situations where centralized technology just wouldn't work. The problem wasn't a lack of central key management solutions. Instead, it was the fragmented networks, continuous common vulnerability remediation, and licensing restrictions that made them unusable.</p><p>Today, I&#8217;m going to show you exactly how to implement VIA&#8217;s Zero Trust Fabric (ZTF) authentication system that eliminates passwords entirely and takes less than five minutes to set up.</p><p>And the best part? Your users will actually <strong>thank you</strong> for making their lives easier.</p><h2><strong>What is ZTF?</strong></h2><p>Zero Trust Fabric (ZTF) is VIA&#8217;s advanced security framework built on the key principle of Zero Trust: &#8220;never trust, always verify&#8221; (listen to Zero Trust creator <a href="https://youtube.com/shorts/9MtY54q_1u8?si=ALfdIQwGqRQkBSBp">John Kindervaag break down Zero Trust principles in 60 seconds</a>). It provides a decentralized passwordless authentication infrastructure that moves beyond traditional perimeter-based security models to protect against modern cybersecurity threats.</p><p>You might be thinking, &#8220;implementing proper passwordless authentication requires months of development, complex infrastructure, and deep security expertise.&#8221; But with solutions like ZTF, this is no longer the case.</p><p><strong>Pro-tip: </strong>Big players such as <a href="https://www.microsoft.com/en-us/security/blog/2019/08/20/one-simple-action-you-can-take-to-prevent-99-9-percent-of-account-attacks/">Microsoft</a> eliminated <strong>99.9%</strong> of their authentication attacks simply by going passwordless.</p><h2><strong>What you&#8217;re about to build</strong></h2><p>In the next few minutes, you'll create a production-ready React application with:</p><p>&#9989; <strong>Passwordless authentication</strong> using industry-standard OAuth 2.0 + PKCE</p><p>&#9989; <strong>Automatic token refresh</strong>, which means no more "session expired" errors</p><p>&#9989; <strong>Zero-trust security</strong> with JWT validation</p><p>&#9989; <strong>Docker containerization</strong> for instant deployment</p><p>&#9989; <strong>CORS configuration</strong> that actually works in production</p><p><strong>Did you know:</strong> Major enterprises like BMW, Deutsche Bank, and Netflix use similar zero trust architectures.</p><h2><strong>Prerequisites (Don't skip this)</strong></h2><p>Before we start, make sure you have:</p><ul><li><p><a href="https://github.com/viascience/ztf-tutorial/tree/master/tutorial-1-Passwordless">ZTF Tutorial Github</a> open </p></li><li><p>Node.js 18+ installed</p></li><li><p>Docker running on your machine</p></li><li><p>5 minutes of uninterrupted time</p></li><li><p>A coffee &#9749; (optional but recommended)</p></li></ul><p>Ready? Let's build something amazing.</p><h2><strong>Step 1: Understand the architecture</strong></h2><p>Here's the beautiful simplicity of what we're building:</p><pre><code>User &#8594; React App &#8594; Keycloak &#8594; JWT Token &#8594; Protected Resources</code></pre><p><strong>Why this works:</strong></p><ol><li><p><strong>User Experience:</strong> One-click authentication, no passwords to remember.</p></li><li><p><strong>Security:</strong> Public and private key cryptography avoiding centralized passwords.</p></li><li><p><strong>Scalability:</strong> Handles high volumes of users thanks to the decentralization of credentials over mobile devices.</p></li><li><p><strong>Developer Experience:</strong> Set it up once, forget about auth forever.</p></li></ol><h2><strong>Step 2: The magic configuration (where most people mess up)</strong></h2><p>Here's a configuration that is a great starting point for many developers:</p><pre><code>const keycloak = new Keycloak({
  url: "https://auth.solvewithvia.com/auth",
  realm: "ztf_demo", 
  clientId: "localhost-app"
});

// The secret sauce most tutorials don't mention
keycloak.init({ 
  onLoad: "login-required",
  redirectUri: window.location.origin + "/",
  checkLoginIframe: false,        // &#8592; Critical for modern browsers
  responseMode: "query",
  pkceMethod: "S256",             // &#8592; This helps prevent attacks
  enableLogging: true,
  scope: "openid profile email",
  flow: "standard",
  useNonce: true                 // &#8592; Enabled for better security with nonce validation
})
</code></pre><p><strong>Pro-tip</strong>:<em> </em>This configuration is a common, secure pattern used in production environments.</p><h2><strong>Step 3: Token management gamechanger</strong></h2><p>Most authentication tutorials teach you how to configure the log in experience. Few teach you how to ensure users <em>stay logged in securely</em>. Here&#8217;s an example of how you should handle refresh tokens and log outs for a seamless user experience that follows security best practices.</p><pre><code>const setupTokenRefresh = () =&gt; {
  keycloak.updateToken(360).then((refreshed) =&gt; {
    if (refreshed) {
      console.log('Token refreshed seamlessly');
      // User never knows this happened
    }
    setCurrentToken(keycloak.token);
    setLastTokenUpdate(new Date());
  }).catch((error) =&gt; {
    // Graceful fallback - no jarring redirects
    keycloak.login();
  });
};

// Auto-refresh every 5 minutes
setInterval(setupTokenRefresh, 300000);
</code></pre><p><strong>Pro-tip:</strong> Users hate being interrupted. This silent refresh means they can work for hours without thinking about authentication. Happy users = loyal users.</p><h2><strong>Step 4: Docker deployment</strong></h2><p>Get production-ready in seconds. Move your React app from development to production by switching from a local development server to a robust, dedicated web server like NGINX.</p><pre><code>FROM node:18-alpine as build
WORKDIR /app
COPY package*.json ./
RUN npm install
COPY . .
RUN npm run build

FROM nginx:alpine
COPY --from=build /app/build /usr/share/nginx/html
COPY nginx.conf /etc/nginx/nginx.conf
EXPOSE 80
CMD ["nginx", "-g", "daemon off;"]
</code></pre><p><strong>One-command deployment:</strong></p><pre><code>docker-compose up -d --build</code></pre><p><strong>Pro-tip:</strong> Feel free to use this production-ready Docker configuration<strong>.</strong></p><p><strong>Want to take a deeper dive? </strong>Check out the <a href="https://documentation.ztf.solvewithvia.com/tutorial/">full ZTF documentation</a>. </p><blockquote><p><strong>Important:</strong> To avoid needing a domain we used HTTP in this tutorial, but don&#8217;t forget that your app will need to upgrade to HTTPS before releasing to your users!</p></blockquote><h2><strong>Security best practices</strong></h2><p><strong>Tips for enterprise-grade security:</strong></p><ol><li><p><strong><a href="https://cheatsheetseries.owasp.org/cheatsheets/HTML5_Security_Cheat_Sheet.html">Memory storage</a>:</strong> Tokens in memory, never localStorage (prevents XSS attacks).</p></li><li><p><strong><a href="https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#:~:text=change%20the%20password.-,Transmit%20Passwords%20Only%20Over%20TLS%20or%20Other%20Strong%20Transport,%C2%B6,-See%3A%20Transport">HTTPS everywhere</a>:</strong> Non-negotiable in production.</p></li><li><p><strong>Restrictive <a href="https://owasp.org/www-community/attacks/CORS_OriginHeaderScrutiny">cross origin</a> authorization between ZTF and the application:</strong> Only allow necessary origins.</p></li><li><p><strong><a href="https://cheatsheetseries.owasp.org/cheatsheets/Authorization_Cheat_Sheet.html">Backend validation</a>:</strong> Always validate tokens server-side.</p></li></ol><p>These practices are mandated by security frameworks like NIST, OWASP, and used by financial institutions processing trillions of dollars.</p><h2><strong>Troubleshooting</strong></h2><p><strong>Common issues that slow down developers.</strong></p><ol><li><p><strong>&#8220;Invalid nonce&#8221; errors?</strong> &#8594; If you encounter nonce validation errors, ensure your keycloak-js version matches your Keycloak deployment version. Current configuration uses &#8216;useNonce: true&#8217; with Keycloak 25.0.6</p></li><li><p><strong>CORS nightmares?</strong> &#8594; Check Keycloak client's Web Origins</p></li><li><p><strong>Redirect loops?</strong> &#8594; Verify valid redirect URIs match exactly</p></li></ol><p>This troubleshooting section alone could save you hours of debugging. You&#8217;re welcome!</p><h2><strong>What you've just accomplished</strong></h2><p>Stop and appreciate what you've built.</p><p>&#9989; <strong>Enterprise-grade security</strong> that help you go passwordless like Fortune 500 companies</p><p>&#9989; <strong>Seamless user experience</strong> that removes friction</p><p>&#9989; <strong>Production-ready deployment</strong> with zero configuration hassle</p><p>&#9989; <strong>Automatic token management</strong> that works seamlessly</p><p>&#9989; <strong>Future-proof architecture</strong> that scales to millions of users</p><h2><strong>Implementation challenge</strong></h2><p>Here's my challenge for you.</p><ol><li><p><strong>Today:</strong> Clone this repository and get it running locally.</p></li><li><p><strong>This week:</strong> Adapt the configuration for your own project.</p></li><li><p><strong>Share:</strong> Tell me about your implementation on <a href="https://www.linkedin.com/in/jesus-alejandro-cardenes-cabre/">LinkedIn</a> or <a href="https://x.com/jesuscrdns">X</a>.</p></li></ol><p><strong>Why this matters:</strong> Every day you delay implementing proper authentication, you're exposing your users and your business to unnecessary risk.</p><h2><strong>Join the passwordless revolution</strong></h2><p><strong>The facts are undeniable.</strong></p><ul><li><p>Passwords are a primary factor in many data breaches.</p></li><li><p>Users abandon apps with complex auth flows.</p></li><li><p>Passwordless auth increases user engagement.</p></li><li><p>Implementation takes less time than reading this article.</p></li></ul><p>The question isn't whether you should implement passwordless authentication.</p><p>The question is: <strong>What's stopping you?</strong></p><h2><strong>ZTF Authentication Resources</strong></h2><p><strong>Want to go deeper?</strong> Here are the resources that shaped this tutorial.</p><ul><li><p><em><a href="https://documentation.ztf.solvewithvia.com/">ZTF Documentation</a></em></p></li><li><p><em><a href="https://www.keycloak.org/securing-apps/javascript-adapter">Keycloak JS Documentation</a></em></p></li><li><p><em><a href="https://tools.ietf.org/html/rfc7636">OAuth 2.0 PKCE Specification</a></em></p></li><li><p><em><a href="https://owasp.org/www-project-authentication/">OWASP Authentication Guidelines</a></em></p></li><li><p><em><a href="https://www.nist.gov/publications/zero-trust-architecture">Zero Trust Architecture (NIST)</a></em></p></li></ul><h2><strong>About the author</strong></h2><p><a href="https://www.linkedin.com/in/jesus-alejandro-cardenes-cabre/">Jesus Cardenes</a>, VIA's Senior Vice President, Product Architecture, is responsible for the technical roadmap and architectural design of all VIA products and its Web3 platform. He is known for his expertise in connecting technologies and platforms to create seamless user experiences. An interesting fact about Jesus is that he competed in the junior roller hockey national club finals in Spain!</p><div><hr></div><p>Building software for the DoD shouldn't be a constant battle with access. We know, because we've been there. We built VIA's Zero Trust Fabric to fix all that.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/ztf-platform/&quot;,&quot;text&quot;:&quot;Try it free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/ztf-platform/"><span>Try it free</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[The risky business of software development]]></title><description><![CDATA[Building DoD software is risky. Learn 5 ways dev teams can manage risk, boost security, and earn trust&#8212;without just checking boxes.]]></description><link>https://www.viaknowledgehub.com/p/the-risky-business-of-software-development</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/the-risky-business-of-software-development</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Tue, 16 Sep 2025 03:45:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!t1fL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!t1fL!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!t1fL!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!t1fL!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!t1fL!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!t1fL!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!t1fL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:39088,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/173724641?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!t1fL!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!t1fL!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!t1fL!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!t1fL!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66fc47f5-1f97-4993-9df6-402736013db4_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><code>What&#8217;s inside:</code></p><ul><li><p><code>&#8220;The risky business of software development: five tips for becoming fluent in risk&#8221;</code></p></li><li><p><code>Resources: DoD&#8217;s current Risk Management Framework (RMF) explained, a risk analysis overview</code></p></li><li><p><code>The weekly brief: A new RMF in the works, a guide to security chaos engineering, and an upcoming tutorial on how to build military-grade authentication</code></p></li></ul><h1>The risky business of software development: five tips for becoming fluent in risk</h1><p>Ok, we know you&#8217;re picturing Tom Cruise sliding across a hardwood floor in his underwear, mic in hand (er, candlestick?). But that&#8217;s not where we&#8217;re going with this&#8230; building software is risky business. And while risk management may not appear in the qualifications for a software engineer job posting, understanding, managing, and mitigating risk is an implicit requirement for dev teams working with the DoD.</p><div id="youtube2-G2UVsyVLLcE" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;G2UVsyVLLcE&quot;,&quot;startTime&quot;:&quot;40&quot;,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/G2UVsyVLLcE?start=40&amp;rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>First, a very quick introduction to key terms related to risk. As an engineer, an important part of your job is protecting information and information systems. From what exactly? &#8220;Risks that arise from the loss of confidentiality, integrity, or availability of information or information systems,&#8221; according to the folks at the <a href="https://csrc.nist.gov/glossary/term/risk">National Institute of Standards and Technology (NIST)</a>.</p><p>Here are examples of confidentiality, integrity, and availability:</p><ul><li><p><strong>Confidentiality</strong>: Only authorized personnel can access intelligence reports.</p></li><li><p><strong>Integrity</strong>: GPS coordinates aren&#8217;t altered by threat actors.</p></li><li><p><strong>Availability</strong>: Secure networks stay online even during a cyberattack. Ironically, well-meaning but cumbersome security controls can also disrupt availability by slowing down authorized users.</p></li></ul><p>Building software always involves risk. Some risks, like a brief service disruption for a rarely-used feature, may be unlikely and have minor impact. Others, such as a data breach from an unpatched vulnerability, can lead to lost contracts, fines, lawsuits, or even put your organization out of business. More critically, you put the mission, and the Nation, at risk.</p><h3>Five tips for building risk fluency</h3><p>1. <strong>Accept that managing risk is part of your job.</strong> In fact, DevSecOps is a method for managing risk, ensuring dev teams are thinking about security as soon as a product or feature is a twinkle in their eye, through planning, implementation, and the entire lifecycle of a product.</p><ul><li><p><strong>Bonus</strong>: Once you get past denial and into acceptance, you&#8217;ll see that risk management is a creative, cross-disciplinary exercise that often improves efficiency, the user experience, <em>and</em> security.</p></li></ul><p><strong>2. Focus on risk, not checkboxes.</strong> Yeah, yeah, we know compliance is not security. Devs need to go deeper, understanding the risk that underpins compliance. For example, you may have to protect the system with multi-factor authentication, but you have some flexibility in exactly how that is implemented to provide flexibility and usability to support your users. In other words, you don&#8217;t have to just check a box, you can provide an optimal experience (as emphasized in our recent <a href="https://www.viaknowledgehub.com/p/dod-tech-speed-security-and-strategic">VIA Knowledge Hub podcast episode with Michael Frank, Deputy CTO for the Department of the Navy</a>).</p><ul><li><p><strong>Bonus</strong>: This approach also leads to more productive conversations with compliance leaders and the DoD.</p></li></ul><p><strong>3. Drag risk into the sunlight. </strong>Get comfortable participating in cross-disciplinary risk assessments, where you&#8217;ll identify risks, score them based on likelihood and impact, and craft a plan to mitigate them. Also, risk assessments are not a one and done, they are an ongoing exercise. In fact, they kind of remind us of <a href="https://www.youtube.com/watch?v=b4ztfrr8fls">Lamb Chop&#8217;s Play Along: The Song That Doesn&#8217;t End</a>.</p><div id="youtube2-b4ztfrr8fls" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;b4ztfrr8fls&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/b4ztfrr8fls?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><ul><li><p><strong>Bonus</strong>: As an engineer, you bring unique insight into the risks inherent in your system. Playing an active role highlights your value and strengthens your career path.</p></li></ul><p><strong>4. Use the four risk options: avoid, mitigate (reduce), accept, transfer. </strong>As <a href="https://www.viaknowledgehub.com/p/a-devs-guide-to-hacking-dod-compliance">VIA&#8217;s Vice President of Software Engineering, John Muddle, advises: avoid risk where possible</a>&#8212;for instance, by minimizing third-party dependencies. If you only need one dataclass and minimal validation, for example, it might not make sense to install Pydantic. Instead, use Python&#8217;s built-in dataclasses. Other risks should be mitigated (or reduced) with security controls. Be cautious when accepting or transferring risk, as these decisions will face DoD scrutiny. The key is knowing your stack, its risks, and being ready to talk about them.</p><ul><li><p><strong>Bonus</strong>: Your clients in government will feel comfortable putting their trust in you if they feel you not only understand, but are open and upfront about, the risks in your platform.</p></li></ul><p><strong>5. Shift left. </strong>The earlier the concept of risk is introduced in the development process, the more likely developers are to minimize risk as they build software for DoD.</p><ul><li><p><strong>Bonus</strong>: Talking about risk from the start moves you closer to the coveted <a href="https://www.cisa.gov/securebydesign">&#8220;secure by design&#8221;</a> posture.</p></li></ul><p><strong>The bottom line</strong>: Trust comes from showing the DoD you understand risk, manage it wisely, and speak about it openly.</p><h1>Need to know</h1><p>You have pressing questions about risk&#8230;we have answers. So you can move closer to preventing the release of vulnerable code and to achieving a secure by design model. Check out the resources below.</p><p><strong><a href="https://csrc.nist.gov/pubs/sp/800/37/r2/final">Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy</a><br></strong>Who doesn&#8217;t feel better when NIST offers up guidelines? The tenets of this framework are a cornerstone of DoD&#8217;s Risk Management Framework (RMF). NIST touts it as providing &#8220;a disciplined, structured, and flexible process for managing security and privacy risk.&#8221; That, they say, includes elements like information security categorization and continuous monitoring.</p><p><strong><a href="https://www.youtube.com/watch?v=xt_Cdtvjbd4">Risk Analysis - Know Your Threat Tolerance</a><br></strong>Still have questions about risk or want a quick video to share with your team? IBM&#8217;s no-nonsense, 5-minute explainer breaks down what these terms mean, why they matter, and gives simple examples anyone can follow.</p><div id="youtube2-xt_Cdtvjbd4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;xt_Cdtvjbd4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/xt_Cdtvjbd4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Take note</h2><p>With all the information swirling around, it&#8217;s hard to know where to focus. Don&#8217;t worry, we&#8217;ve sorted through current headlines, insights, and events and handpicked what should be on your radar for the week.</p><h3>This just happened</h3><p><strong><a href="https://meritalk.com/articles/dod-cio-to-release-new-rmf-in-the-coming-weeks/">&#8220;DOD CIO to Release New RMF in the Coming Weeks&#8221;: MeriTalk</a><br></strong>In a renovation worthy of HGTV, Katie Arrington, acting CIO at the Pentagon, has been promising to remake DoD&#8217;s Risk Management Framework into a Ten Commandments of sorts for software engineers and others doing business with DoD. It looks like Arrington is finally putting action to words, telling an audience at the Billington CyberSecurity Summit in Washington that new guidance that &#8220;retains strong cybersecurity standards without sacrificing speed and innovation&#8221; will be landing in the &#8220;next couple of weeks.&#8221;</p><h3>Worth your time</h3><p><strong><a href="https://kellyshortridge.com/blog/posts/security-chaos-engineering-sustaining-software-systems-resilience-cliff-notes/">The Basics of Software Resilience and Security Chaos Engineering</a><br></strong>All this risk talk can make your eyes glaze over and makes you lose sight of what the ultimate goal is: to build more resilient systems. Kelly Shortridge&#8217;s book <em><a href="https://www.amazon.com/Security-Chaos-Engineering-Sustaining-Resilience/dp/1098113829">Security Chaos Engineering: Sustaining Resilience in Software and Systems</a></em> offers a great introduction to the principles behind resilience and systems thinking, including the helpful reframing of &#8220;treating resilience&#8212;security included&#8212;as a product.&#8221; This blog post overview of her book is an excellent resource for engineers.</p><h3>Don&#8217;t miss this</h3><p>Later this week, check out the tutorial <a href="https://www.viaknowledgehub.com/p/authentication-in-five-minutes">&#8220;How I built military-grade authentication in five minutes (and why your users will love going passwordless)&#8221;</a> from Jesus Cardenes, VIA&#8217;s Senior Vice President, Product Architecture.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!3Upx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!3Upx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!3Upx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!3Upx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!3Upx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!3Upx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:63324,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/173724641?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!3Upx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!3Upx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!3Upx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!3Upx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6994bf8c-e853-4216-8ee7-e8c684069e8a_1456x1048.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h4>Building software for the DoD often means battling with access challenges. We know, because we've been there. We built <strong>VIA's Zero Trust Fabric </strong>to fix all that. </h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/ztf-platform/&quot;,&quot;text&quot;:&quot;Try it out free&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/ztf-platform/"><span>Try it out free</span></a></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.viaknowledgehub.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to our newsletter to be the first to get access to exclusive live webinars, expert Q&amp;A's, and other invite-only events.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[DoD tech: speed, security, and strategic partnerships]]></title><description><![CDATA[Michael Frank, Deputy CTO, Department of the Navy says: know the mission, know your product, and show your risk math&#8212;that&#8217;s how commercial teams win in defense.]]></description><link>https://www.viaknowledgehub.com/p/dod-tech-speed-security-and-strategic</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/dod-tech-speed-security-and-strategic</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Fri, 12 Sep 2025 15:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173297483/31b389cff29de84fe886078a091f4488.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Want to build software for the DoD? You won&#8217;t get better guidance than from <a href="https://www.linkedin.com/in/mfrank174/">Michael Frank</a>, Deputy CTO, Department of the Navy, who works with entrepreneurs, non-traditional DoD contractors, and private capital to connect mission needs with commercial solutions. Mike says the best partners are adaptable and communicate relentlessly. While they might push back on &#8220;bespoke everything,&#8221; they still respect real DoD constraints. They&#8217;re fluent in risk, laying out crisp assessments of what&#8217;s accepted, what&#8217;s been mitigated, and why.</p><p><strong>Bottom line:</strong> know the mission, know your product, and flash your risk math prowess. That&#8217;s how commercial teams win in defense.</p><div id="youtube2-eyKduiSiyOM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;eyKduiSiyOM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/eyKduiSiyOM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h2>Key takeaways:</h2><ul><li><p><strong>DoD work = hardest, most meaningful problems</strong>. The kind that attracts top talent and spins out dual-use breakthroughs.</p></li><li><p><strong>Use dual-use to your advantage.</strong> Navy focus areas (cyber, threat intel, AI, quantum/PQC) let you build once and win in both defense and commercial markets.</p></li><li><p><strong>One product, one UX.</strong> There shouldn&#8217;t be an &#8220;optimal UX for commercial&#8221; and &#8220;suboptimal UX for DoD.&#8221; Great UX should be universal.</p></li><li><p><strong>Speed vs. security is a choice. </strong>Understand and own it.<strong> </strong>In other words, skip controls now, pay the price later. Mike says it&#8217;s important for teams to understand &#8220;Everything we engineer, everything we build, must be secure from day one. That must be the priority.&#8221;</p></li><li><p><strong>Mike&#8217;s team embraces &#8220;secure by design.&#8221; </strong>Engineering and security leaders take note: bake in compliance up front and give engineers paved roads, not bolt-ons.</p></li><li><p><strong>Great partners adapt and communicate.</strong> Just like in any healthy, thriving relationship, they learn how to work with the government, they&#8217;re great communicators, they know how to push back (the DoD doesn&#8217;t expect &#8220;bespoke everything&#8221;) but also remain flexible and recognize there are DoD-specific constraints.</p></li><li><p><strong>Get fluent in risk. </strong>Conduct a risk assessment, have a deep understanding of what risks exist and what you&#8217;re doing about them. This is evidence you understand both your product and the broader mission.</p></li></ul><h4>About Michael Frank</h4><p>Michael Frank is the Deputy Chief Technology Officer for the Department of the Navy. In addition to his role as Deputy CTO, he&#8217;s also currently Cyber Portfolio Lead for the Marine Innovation Unit as a Marine Reservist.</p><p>Mike is an expert at navigating the unique challenges of the DoD <em>and</em> part of his role is helping organizations work successfully with the Department of the Navy. In other words, Mike's the person you want on your team! What's especially great about Mike is his 360-degree view. He&#8217;s consulted for both public and private sectors, so he truly understands the landscape. He's seen it all.</p><p>After college, Mike served for four years on active duty in the Marine Corps as a communications officer. He continued (and continues!) his service in the reserves, where he established Defensive Cyber Operations (DCO) Companies. Simultaneously, he earned his MBA and worked in consulting at Accenture and Boston Consulting Group (BCG).</p><p>At Accenture and BCG, Mike worked with various DoD organizations, consulted on cyber issues for the Department of Energy and Department of State, and advised banks, insurance companies, and healthcare companies. Basically, he&#8217;s got a ton of experience understanding and solving critical problems for all sorts of organizations.</p><p><strong>Like this podcast episode? We&#8217;d love if you shared it!</strong></p><div><hr></div><h4>Building software for the DoD shouldn't be a constant battle with access. We know, because we've been there. We built VIA's Zero Trust Fabric to fix all that. </h4><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.solvewithvia.com/ztf-platform/&quot;,&quot;text&quot;:&quot;See how it works&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.solvewithvia.com/ztf-platform/"><span>See how it works</span></a></p>]]></content:encoded></item><item><title><![CDATA[A dev’s guide to hacking DoD compliance ]]></title><description><![CDATA[John Muddle&#8217;s top five tips for overcoming DoD compliance challenges.]]></description><link>https://www.viaknowledgehub.com/p/a-devs-guide-to-hacking-dod-compliance</link><guid isPermaLink="false">https://www.viaknowledgehub.com/p/a-devs-guide-to-hacking-dod-compliance</guid><dc:creator><![CDATA[VIA Knowledge Hub]]></dc:creator><pubDate>Fri, 05 Sep 2025 20:47:00 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/42abc8ea-8fef-4cdc-b847-20cf5c07f5d1_1456x1048.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2oyo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2oyo!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!2oyo!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!2oyo!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!2oyo!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2oyo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:55829,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/172907900?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2oyo!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!2oyo!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!2oyo!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!2oyo!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff63ac6bc-d8ec-4f3c-ab4c-570fb4ddb5cb_1456x1048.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p><code>What&#8217;s inside:</code></p><ul><li><p><code>DoD dev: John Muddle&#8217;s top five tips for overcoming DoD compliance challenges</code></p></li><li><p><code>Resources: DevSecOps definitions and requirements, Authority to Operate (ATO) explained</code></p></li><li><p><code>Take note: DevSecOps updates at the DoD, AI Cyber Challenge by DARPA, and an upcoming interview with Mike Frank, Deputy Chief Technology Officer, Department of the Navy CIO</code></p></li></ul><h1>DoD dev: John Muddle's top five</h1><p>As VP of Software Engineering at VIA, John Muddle is no stranger to the compliance challenges of developing software for the Department of Defense (DoD). He may jokingly claim he embraced DevSecOps &#8220;before it was cool&#8221; (wait, is John implying DevSecOps is cool now?), but John was instrumental in VIA&#8217;s early efforts to meet the security controls for IL 2, 4, and 6. Read on to see his must-haves for navigating and conquering DoD&#8217;s compliance maze.</p><p><em>Handling DoD data in the cloud? <a href="https://www.secondfront.com/resources/blog/understanding-dod-cloud-computing-impact-levels/">You&#8217;ll need to become familiar with IL (&#8220;impact levels) 2, 4, 5, and 6.</a></em></p><h4><strong>John&#8217;s top five key takeaways for dev teams working with the DoD:</strong></h4><ul><li><p><strong>Build on top of secure and lean base images.</strong> Start by using hardened base images with minimal vulnerabilities. The choice of operating system is also critical. Python packages must be compatible with the right underlying C library.</p><ul><li><p><strong>Pro tip:</strong> Initially tap <a href="https://p1.dso.mil/ironbank">Iron Bank</a>, <a href="https://www.chainguard.dev/">Chainguard</a>, or <a href="https://www.docker.com/">Docker</a> for hardened base images.</p></li></ul></li><li><p><strong>Minimize third-party dependencies.</strong> Reduce external dependencies to limit potential vulnerabilities and shrink the attack surface.</p><ul><li><p><strong>Pro tip: </strong>If you only need one dataclass and minimal validation, for example, it might not make sense to install Pydantic. Instead, use Python&#8217;s built-in dataclasses.</p></li></ul></li><li><p><strong>Embrace "shift left" for code scanning.</strong> Integrate code scanning early in the development lifecycle to proactively identify and address security issues.</p><ul><li><p><strong>Pro tip: </strong>Check out Trivy or Grype, both open source vulnerability scanners.</p></li></ul></li><li><p><strong>Understand your </strong><em><strong>entire</strong></em><strong> stack.</strong> Compliance extends to the entire software stack, including the OS, dependencies, and processor. Without a comprehensive understanding of your full stack&#8217;s vulnerability profile you&#8217;ll leave your organization open to exploitation.</p><ul><li><p><strong>Pro tip:</strong> If you don&#8217;t know what processor you're using (which is surprisingly commonplace), then find out.</p></li></ul></li><li><p><strong>Be strategic with vulnerability management.</strong> You have three options when it comes to vulnerabilities and working with the DoD:</p><ul><li><p>1. <strong>Ask if the problematic code is really necessary. </strong>If not, remove it.</p></li><li><p>2. <strong>Refactor</strong> your code or <strong>upgrade</strong> the library.</p></li><li><p>3. If those options don&#8217;t apply, then <strong>justify the vulnerability</strong>. But know that will be a hard sell.</p></li><li><p><strong>Pro tip</strong>: Check out <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">CISA&#8217;s Known Exploited Vulnerabilities (KEV) Catalog</a> and <a href="https://nvd.nist.gov/vuln">NIST&#8217;s National Vulnerability Database (NVD)</a></p></li></ul></li></ul><div><hr></div><h1>Need to know</h1><p><em>You have pressing compliance questions&#8230;we have answers. So you can build faster and get back to shipping. Check out the resources below.</em></p><ol><li><p><strong><a href="https://www.doncio.navy.mil/ContentView.aspx?id=15942">Rapid Assess and Incorporate Software Engineering 2.0 Implementation Guide</a></strong></p><p>If you need to wrap your head around DevSecOps guidelines, definitions, and requirements, our engineers recommend starting with this guide, designed to enable the Department of the Navy Digital Warfighter to respond quickly to the &#8220;evolving demands of cyber warfare and achieve a continuous cyber readiness.&#8221;</p><p><strong>Author</strong>: the Department of the Navy Chief Information Officer</p><p></p><p></p></li><li><p><strong><a href="https://www.secondfront.com/resources/blog/what-is-an-authority-to-operate-ato/">What is Authority to Operate (ATO)?</a></strong></p><p>Selling your software to the DoD may require an Authority to Operate (ATO) first. Don&#8217;t know what this means? Hint: &#8220;It&#8217;s a status that approves an IT system for use in a particular organization.&#8221; This article explains the process, what to expect, and how to overcome common obstacles.</p><p><strong>Author</strong>: Second Front</p></li></ol><h1>Take note</h1><p><em>With all the information swirling around, it&#8217;s hard to know where to focus. Don&#8217;t worry, we&#8217;ve sorted through current headlines, insights, and events and handpicked what should be on your radar for the week.</em></p><h3><strong>This just happened</strong></h3><p><a href="https://govciomedia.com/dod-expands-devsecops-to-accelerate-software-deployment/">&#8220;DOD Expands DevSecOps to Accelerate Software Deployment&#8221;</a>: GOVCIO Media &amp; Research (article)</p><h3><strong>Worth your time</strong></h3><p>&#8220;Andrew Carney (DARPA: Defense Advanced Research Projects Agency) gives an inside look into AI Cyber Challenge&#8221;: Resilient Cyber (Video)</p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:171555227,&quot;url&quot;:&quot;https://www.resilientcyber.io/p/resilient-cyber-w-andrew-carney-darpa&quot;,&quot;publication_id&quot;:1138747,&quot;publication_name&quot;:&quot;Resilient Cyber&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!ITbg!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F71894ea3-c231-4d31-90a9-414d75111d0e_1280x1280.png&quot;,&quot;title&quot;:&quot;Resilient Cyber w Andrew Carney DARPA AI Cyber Challenge AIxCC&quot;,&quot;truncated_body_text&quot;:&quot;In this episode, I interview Andrew Carney, the Program Manager for DARPA's AI Cyber Challenge (AIxCC).&quot;,&quot;date&quot;:&quot;2025-08-21T12:41:30.211Z&quot;,&quot;like_count&quot;:9,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:106921976,&quot;name&quot;:&quot;Chris Hughes&quot;,&quot;handle&quot;:&quot;resilientcyber&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substackcdn.com/image/fetch/f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa6e409c2-2aa2-4d46-b20b-225e3a9b62d0_2500x1875.jpeg&quot;,&quot;bio&quot;:&quot;Passionate about the creating a more resilient digital society.&quot;,&quot;profile_set_up_at&quot;:&quot;2022-10-11T20:02:08.703Z&quot;,&quot;reader_installed_at&quot;:&quot;2024-07-02T12:29:50.885Z&quot;,&quot;publicationUsers&quot;:[{&quot;id&quot;:1090171,&quot;user_id&quot;:106921976,&quot;publication_id&quot;:1138747,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:1138747,&quot;name&quot;:&quot;Resilient Cyber&quot;,&quot;subdomain&quot;:&quot;resilientcyber&quot;,&quot;custom_domain&quot;:&quot;www.resilientcyber.io&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity, Cloud, DevSecOps and Software Supply Chain Security&quot;,&quot;logo_url&quot;:&quot;https://bucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com/public/images/71894ea3-c231-4d31-90a9-414d75111d0e_1280x1280.png&quot;,&quot;author_id&quot;:106921976,&quot;primary_user_id&quot;:106921976,&quot;theme_var_background_pop&quot;:&quot;#9D6FFF&quot;,&quot;created_at&quot;:&quot;2022-10-11T20:03:27.378Z&quot;,&quot;email_from_name&quot;:null,&quot;copyright&quot;:&quot;Chris Hughes&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;magaziney&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:1,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:{&quot;type&quot;:&quot;subscriber&quot;,&quot;tier&quot;:1}}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:true,&quot;type&quot;:&quot;podcast&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.resilientcyber.io/p/resilient-cyber-w-andrew-carney-darpa?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!ITbg!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F71894ea3-c231-4d31-90a9-414d75111d0e_1280x1280.png" loading="lazy"><span class="embedded-post-publication-name">Resilient Cyber</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title-icon"><svg width="19" height="19" viewBox="0 0 24 24" fill="none" xmlns="http://www.w3.org/2000/svg">
  <path d="M3 18V12C3 9.61305 3.94821 7.32387 5.63604 5.63604C7.32387 3.94821 9.61305 3 12 3C14.3869 3 16.6761 3.94821 18.364 5.63604C20.0518 7.32387 21 9.61305 21 12V18" stroke-linecap="round" stroke-linejoin="round"></path>
  <path d="M21 19C21 19.5304 20.7893 20.0391 20.4142 20.4142C20.0391 20.7893 19.5304 21 19 21H18C17.4696 21 16.9609 20.7893 16.5858 20.4142C16.2107 20.0391 16 19.5304 16 19V16C16 15.4696 16.2107 14.9609 16.5858 14.5858C16.9609 14.2107 17.4696 14 18 14H21V19ZM3 19C3 19.5304 3.21071 20.0391 3.58579 20.4142C3.96086 20.7893 4.46957 21 5 21H6C6.53043 21 7.03914 20.7893 7.41421 20.4142C7.78929 20.0391 8 19.5304 8 19V16C8 15.4696 7.78929 14.9609 7.41421 14.5858C7.03914 14.2107 6.53043 14 6 14H3V19Z" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><div class="embedded-post-title">Resilient Cyber w Andrew Carney DARPA AI Cyber Challenge AIxCC</div></div><div class="embedded-post-body">In this episode, I interview Andrew Carney, the Program Manager for DARPA's AI Cyber Challenge (AIxCC&#8230;</div><div class="embedded-post-cta-wrapper"><div class="embedded-post-cta-icon"><svg width="32" height="32" viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg">
  <path classname="inner-triangle" d="M10 8L16 12L10 16V8Z" stroke-width="1.5" stroke-linecap="round" stroke-linejoin="round"></path>
</svg></div><span class="embedded-post-cta">Listen now</span></div><div class="embedded-post-meta">7 months ago &#183; 9 likes &#183; Chris Hughes</div></a></div><h3><strong>Don&#8217;t miss this</strong></h3><p>Exclusive interview with Mike Frank, Deputy Chief Technology Officer and Department of the Navy Chief Information Officer. <a href="https://www.viaknowledgehub.com/p/dod-tech-speed-security-and-strategic">Watch it now!</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mFbV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mFbV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!mFbV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!mFbV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!mFbV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mFbV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic" width="1456" height="1048" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1048,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:62485,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.viaknowledgehub.com/i/172907900?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!mFbV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 424w, https://substackcdn.com/image/fetch/$s_!mFbV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 848w, https://substackcdn.com/image/fetch/$s_!mFbV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 1272w, https://substackcdn.com/image/fetch/$s_!mFbV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc391f2eb-84e2-4531-8384-781b4ace9355_1456x1048.heic 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.viaknowledgehub.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe to our newsletter to be the first to get access to exclusive live webinars, expert Q&amp;A's, and other invite-only events.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>