Pomerium (@pomerium_io) 's Twitter Profile
Pomerium

@pomerium_io

Pomerium is an open-source identity and context-aware access proxy for building secure connections to internal resources

youtube.com/@pomerium_io

ID: 1161447023649837056

linkhttps://www.pomerium.com/ calendar_today14-08-2019 01:18:43

475 Tweet

263 Followers

2 Following

Pomerium (@pomerium_io) 's Twitter Profile Photo

"How do we build these microservice architectures and serverless apps?" Brian Rinaldi joined Nick Taylor to discuss LocalStack, an open-core tool that lets developers run a complete AWS cloud environment on their laptop for faster, cost-effective development and testing.

Pomerium (@pomerium_io) 's Twitter Profile Photo

OAuth ≠ secure by default. Proxy-enforced OAuth is mandatory, not optional What do MCP Security Best Practices actually require and where are current implementations are falling short? Find your answers on Nick Taylor's latest The New Stack piece: thenewstack.io/the-model-cont…

Pomerium (@pomerium_io) 's Twitter Profile Photo

Traditional security models weren't built for autonomous agents. Our latest guide breaks down: → Why MCP changes the security model → How Zero Trust protects agent actions in real time → What to do before connecting LLMs to internal tools Read more: bit.ly/4k2TrsF.

Pomerium (@pomerium_io) 's Twitter Profile Photo

Asana’s MCP bug exposing cross-tenant data serves as a warning. Things can go wrong when: → OAuth is treated as authorization → Agent access isn’t scoped or audited → No enforcement layer stands between the agent and the system Implement guardrails: bit.ly/3TJPPAU

Asana’s MCP bug exposing cross-tenant data serves as a warning.

Things can go wrong when:
→ OAuth is treated as authorization
→ Agent access isn’t scoped or audited
→ No enforcement layer stands between the agent and the system

Implement guardrails:
bit.ly/3TJPPAU
Pomerium (@pomerium_io) 's Twitter Profile Photo

Zero Trust is about reducing attack surface, enforcing least privilege, and continuously reevaluating risk. NIST SP 1800-35 is a a how-to Zero Trust manual based on real technologies, open standards, and 19 implementation builds. Read its key takeaways: bit.ly/3TfcpBl

Pomerium (@pomerium_io) 's Twitter Profile Photo

There's a lot to keep up within the Model Context Protocol (MCP) space, but it's clear that MCP is here and needs to be secured. We’ve compiled June 2025's MCP incidents, industry news, blogs, and other reports. Find it here: bit.ly/4exZvIz

Pomerium (@pomerium_io) 's Twitter Profile Photo

Discuss Event-Driven Architecture for AI Agents Abhi, Head of Developer Advocacy (EMEA/APAC) at DigitalOcean, joins Nick Taylor to discuss event-driven architecture for AI Agents. Join us on Wednesday, July 16 at 9AM ET: youtube.com/watch?v=-ai4ja…

Discuss Event-Driven Architecture for AI Agents

<a href="/diabhey/">Abhi</a>, Head of Developer Advocacy (EMEA/APAC) at DigitalOcean, joins <a href="/nickytonline/">Nick Taylor</a>  to discuss event-driven architecture for AI Agents.

Join us on Wednesday, July 16 at 9AM ET:
youtube.com/watch?v=-ai4ja…
Pomerium (@pomerium_io) 's Twitter Profile Photo

Your team is already sharing sensitive internal data with AI, and these AI agents must be bounded by proper guardrails. Our latest post breaks down: • “Shadow AI" • How to build a secure, low-friction LLM gateway • Real-world case studies Read more: bit.ly/4ny8gpM

Pomerium (@pomerium_io) 's Twitter Profile Photo

A Claude-based IDE with root-level database access was tricked into exfiltrating secrets—just by reading a support ticket. One convincing prompt was all it took. What went wrong, why Row-Level Security (RLS) failed, and what defenses can actually work: bit.ly/4kw6LpJ