Found 33 repositories(showing 30)
Oluwakemi2000
A modular, agentic-AI-based adaptive cybersecurity architecture for digital ecosystems. Combines Zero Trust, real-time telemetry, and intelligent threat response. Built for researchers, developers, and AI security enthusiasts.#AI, #Cybersecurity, #AgenticAI, #IoT.
paulveillard
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Zero Trust Architecture in Cybersecurity.
JuanCS-Dev
🔺 Vértice - Autonomous Cybersecurity Intelligence Platform | Multi-agent AI · Reactive Architecture · Adaptive Immunity · Zero Trust Security
AhmedAlSenaidi
A virtualized Industrial Control System (ICS) cybersecurity testbed implementing Zero Trust Architecture, TLS-encrypted Modbus traffic, and open-source tools for intrusion detection and SIEM.
na455
Full-stack cybersecurity graduation project based on Zero Trust and Software‑Defined Perimeter (SDP) architecture. Includes SPA, Keycloak IAM, mTLS, GUI, SIEM (Wazuh + ELK), and custom controller-client-server implementation.
pavan149150
Enhancing Autonomous Vehicle Cybersecurity with Zero Trust Architecture
aronjose2005
A quantum-enhanced cybersecurity platform for zero trust architecture
visshh05
Minor Project -1 Cybersecurity Risk Assessment Framework for Small Businesses Minor Project -2 Zero Trust Architecture for Enterprise Security Major Project Cyber Security "Phishing Awareness Simulation Using Social Engineering Techniques"
TheZubairUsman
Server-Side Request Forgery (SSRF) remains one of the most dangerous and evolving attack vectors in cybersecurity. As cloud-native architectures, AI-driven applications, and zero-trust models gain traction, SSRF techniques have adapted to bypass traditional defenses.
aryankul17
🚀 Enhancing Healthcare Network Security – A cybersecurity project focusing on multi-layered defense strategies to protect healthcare networks from cyber threats. Developed as a final project for the Information Assurance course, covering GRC, threat modeling (DREAD & STRIDE), Zero Trust, and security architecture improvements. 🔐
MohamedFarook-H
A revolutionary cybersecurity framework that combines Explainable AI with Zero-Trust Architecture for IoT networks
Chameleey
A detailed study on Zero Trust Architecture (ZTA), covering principles, components, real-world implementations, and modern cybersecurity practices.
HacklyHub
Cybersecurity Knowledge Base: Deep dives into PKI, NAC, Network Defense & Zero Trust Architectures. // Hub de veille et analyses techniques.
andreas2301
A Zero-Trust, 3-Tier Multi-Agent Reference Architecture (OLA) decoupling resource orchestration from identity governance to secure sovereign AI systems. #multi-agent-systems #zero-trust #ai-security #mcp #mara #semantic-kernel #cybersecurity #agentic-ai #architecture-patterns
audreyf45
This research paper explores the principles, architecture, and real‑world implementation of Zero Trust Security, a modern cybersecurity framework built on the idea of “never trust, always verify.”
audreyf45
This research paper explores the principles, architecture, and real‑world implementation of Zero Trust Security, a modern cybersecurity framework built on the idea of “never trust, always verify.”
Qsssynapse
Public, sanitized mirror of QScan Security Suite™ — a 16-module enterprise cybersecurity platform integrating AI/ML, Zero Trust, and quantum-secure architecture.
PradipJoshi0901
This project explored the concept of Zero Trust Architecture (ZTA), highlighting its significance in modern cybersecurity, especially for hybrid work environments. The report analyzed the core principles of Zero Trust and the Zero Trust Maturity Model, which includes Identity, Devices, Networks, Applications & Workloads, and Data.
Karanbadwal04
👋 Hi, I'm Karanvir Singh 🔐 Cybersecurity Enthusiast | Zero Trust Advocate | Lifelong Learner I'm passionate about building secure digital systems and exploring advanced security architectures like Zero Trust and AI-driven threat detection.
Mohammad-mo-02
Academic research paper exploring the evolution, effectiveness, and future direction of firewalls in modern cybersecurity architecture. Covers real-world breaches, Zero Trust, IDS/IPS, and next-gen firewalls.
thesarinjaizz09
Yggdrasil Systems Inc is a luxury cybersecurity firm delivering elite offensive & defensive solutions. We build custom systems, AI-powered tools, and Zero Trust architectures to protect enterprises, governments & individuals. Our mission: uncompromising security, innovation, and trust.
DaneShuler
A research paper analyzing Zero Trust Architecture (ZTA) as a modern cybersecurity framework that replaces perimeter-based defenses with continuous verification, least-privilege access, and micro-segmentation. Explores ZTA principles, implementation challenges, industry adoption, and career relevance in cybersecurity
srivarshini-karthikeyan
ZeroTrustOps-ZT-COT is a modular, interactive Python-based cybersecurity toolkit that operationalizes Zero Trust Architecture principles through 14 integrated security tools all accessible from a single command-line interface.
mariw-lab
OSEC Cyber Defense engineers secure, high-availability infrastructure for international payments and automation. We specialize in hardened systems architecture, zero-trust integrations, and stealth-grade cybersecurity tailored for modern financial operations.
Day 5 of my cybersecurity journey covers domains, advanced terminology, network & web vulnerabilities, security tools, vulnerability management, incident response lifecycle, SIEM/SOC/SOAR operations, and Zero Trust architecture. Notes documented for SOC, IR, and GRC foundations.
Joshua633
NeXSheild is a commercial-grade cybersecurity application designed to secure server and host environments through a rigorous Zero Trust Architecture (ZTA). Moving beyond traditional perimeter security, the system operates on the core principle of "Never Trust, Always Verify," ensuring that every user and device is authenticated continuously.
asastillero
Mock Zero Trust Architecture (ZTA) plan for a small business, aligned with NIST guidelines. Includes role-based access control, segmentation, MFA, cloud security controls, and SIEM-based monitoring. Designed and documented by Aino Astillero for cybersecurity portfolio.
Kxanx1538
Cybersecurity & Cloud Infrastructure Portfolio | Hands-on projects spanning IAM/Zero Trust, Cloud Security, Infrastructure as Code (IaC), SIEM, and GRC. Includes architecture diagrams, case studies, and resume-ready accomplishments from real-world systems I’ve built and secured.
Sevdevs
A cybersecurity portfolio project showcasing end-to-end encrypted messaging with a zero-trust server architecture. Features client-side key generation, Web Crypto API, Argon2 password hashing and optional TOTP-based MFA. Built with Python/FastAPI backend and React frontend.
HARSHA2396
A cybersecurity project focused on securing the network perimeter of a cryptocurrency exchange after a major breach. Redesigned the network architecture with segmentation, firewalls, and VPN access. Deployed a SIEM using ELK Stack and introduced Zero Trust principles for stronger security.