Blog roll please!

Quick reads across a variety of topics

Diode Product Update - December 2023

Diode

20 Dec
11:25
Diode Product Update - December 2023
Diode Product Update - December 2023 We hope everyone is having an awesome December - our development team has been busy improving our products for you all. Here is a recap of the updates we’ve released in the last month (1.8.12 - 1.8.18): Full Web3 and Web2 Proxy We made a decision to expose a full tunneled proxy interface on port 57861. The app natively uses this proxy to connect to Web3 and Web2 Proxy...

Securely Share Remote Drives

Self-Custody

01 Dec
11:25
Securely Share Remote Drives
Remote drive sharing and mapping Although the Diode App is great way to securely share / sync files between devices, some IT environments also need a way to remotely access a shared drive. This is especially true for certain Windows based applications that need to access remote files as if they are on the local machine. Use cases Some applications are created intentionally to only run on a Local Area Network, or on a single...

Messaging App Without A Phone Number

Security

03 Nov
13:45
Messaging App Without A Phone Number
Messaging App Without a Phone Number Finding a messaging app without a phone number is difficult nowadays. Even the apps that are known for some of their security features, such as Signal, WhatsApp, and Telegram, require users to provide a phone number in order to use their services.   However, at Diode, we believe secure communication should be accessible to everyone - whether or not they have a phone number or whether or not they...

Protect Your Digital Footprint

Security

06 Oct
13:45
Protect Your Digital Footprint
Your Digital Footprint The world uses online technologies for essential tasks - the activities create a “digital footprint” that can put online security, and privacy, at risk. Digital footprints often contain sensitive and personal information such as browsing history, location data, social media activity, schedules, online purchases, engagement with certain topics, and even some communications. In aggregate, a user picture is created of “who you are and how you behave.” Security Risks: Digital footprints can...

Zero Trust Replaces VPN

Zero Trust

13 Sep
07:45
Zero Trust Replaces VPN
Why Choose Zero Trust? Zero Trust networking is widely anticipated to replace traditional VPN in the next five years. The reasons for this are primarily three fold: Zero Trust is more precise - unlike VPN, which allows any system in the network to connect, Zero Trust permits only specific identities to connect, regardless of their network context. Zero Trust is context aware - unlike VPN, which allows any available network resource to be used by...

Secure Redzone Collaboration

Security

01 Sep
16:45
Secure Redzone Collaboration
Secure Redzone Collaboration We increasingly live, work, and learn in an interconnected digital landscape.  With its growing complexity, the demand for seamless, secure, and unrestricted access to collaborative resources has never been greater. As a Zero Trust (ZT) communications company, Diode is focused on providing secure collaboration tools to users worldwide in a way that transcends common geographical and technical limitations.  Many of our customers use Diode to stay connected to their teams, partners, contacts,...

Security for NGO and Mission Team Communication

Security

17 Aug
16:45
Security for NGO and Mission Team Communication
Security for NGO and Mission Team Communication Diode believes that technology should help humans thrive. It should enhance our ability to operate, create, explore, educate, and innovate - unhindered. We understand that international NGOs, organizations, and mission groups have a similar desire for people to flourish. In today’s interconnected world, these teams grapple with securing communication channels amidst a diverse and changing landscape. Ensuring privacy and security while exchanging sensitive data is paramount. This is...

Trust Broker Security is Zero Trust Security

Zero Trust

09 Aug
14:45
Trust Broker Security is Zero Trust Security
Trust Brokers Make Zero Trust Possible Zero Trust communications rely on secure communications between continuosly-validated parties.  In Zero Trust, the communications are often end-to-end encrypted (E2EE).  E2EE protects data by encrypting it with a key that is only known to the parties who would like to communicate. However, a universal challenge to establishing E2EE communications across the Internet is in establishing an initial connection between the two parties.   Zero Trust introduces the concept of...

Innovating Zero Trust for the Government Sector

Press

09 Jul
09:45
Innovating Zero Trust for the Government Sector
We wrote in March that Diode was honored to be selected as the emerging Zero Trust communications company to participate in the Defensive Cyber Operations (DCO) for Space cohort program, held at the Catalyst Campus for Technology and Innovation (CCTI) in Colorado Springs, CO. The Catalyst program is a partnership between the Air Force Research Laboratory (AFRL) and CCTI, and its objective is to integrate nontraditional tech companies into the national security ecosystem. Hans and...

The Pillars of Zero Trust Architecture

Zero Trust

27 Jun
16:45
The Pillars of Zero Trust Architecture
Pillars of Zero Trust Architecture Every Zero Trust architecture is built around the “policy of least permission” (aka “least privilege”), but there are certain key pillars of Zero Trust architecture that must be put in place to achieve a system with fine-grained security that enhances the way your organization works. Identity/User Security Each user must have a system-wide identity that can be verified for any access to any information (communications, data, etc.).  This identity must...
< 1 2 3 4 5 6 7 8 9 >