pomerium_io Profile Banner
Pomerium Profile
Pomerium

@pomerium_io

Followers
284
Following
267
Media
296
Statuses
531

Pomerium is an open-source identity and context-aware access proxy for building secure connections to internal resources https://t.co/kjtAAsVhqd

Joined August 2019
Don't wanna be here? Send us removal request.
@pomerium_io
Pomerium
2 years
We summarized important takeaways from NIST's SP 800-207A: A #zerotrust Architecture Model for #accesscontrol in #cloudnative Applications in Multi-Cloud Environments. It's great at East-West traffic, but needed some comments on North-South traffic.
Tweet media one
0
0
3
@pomerium_io
Pomerium
3 days
Your team is already sharing sensitive internal data with AI, and these AI agents must be bounded by proper guardrails. Our latest post breaks down:.• “Shadow AI".• How to build a secure, low-friction LLM gateway.• Real-world case studies. Read more:.
0
0
1
@pomerium_io
Pomerium
4 days
Discuss Event-Driven Architecture for AI Agents. @diabhey, Head of Developer Advocacy (EMEA/APAC) at DigitalOcean, joins @nickytonline to discuss event-driven architecture for AI Agents. Join us on Wednesday, July 16 at 9AM ET:.
Tweet media one
0
0
3
@pomerium_io
Pomerium
5 days
There's a lot to keep up within the Model Context Protocol (MCP) space, but it's clear that MCP is here and needs to be secured. We’ve compiled June 2025's MCP incidents, industry news, blogs, and other reports. Find it here:.
0
4
5
@pomerium_io
Pomerium
6 days
Zero Trust is about reducing attack surface, enforcing least privilege, and continuously reevaluating risk. NIST SP 1800-35 is a a how-to Zero Trust manual based on real technologies, open standards, and 19 implementation builds. Read its key takeaways:.
0
1
2
@pomerium_io
Pomerium
9 days
Asana’s MCP bug exposing cross-tenant data serves as a warning. Things can go wrong when:.→ OAuth is treated as authorization.→ Agent access isn’t scoped or audited.→ No enforcement layer stands between the agent and the system. Implement guardrails:.
Tweet media one
0
0
1
@pomerium_io
Pomerium
12 days
Traditional security models weren't built for autonomous agents. Our latest guide breaks down:.→ Why MCP changes the security model.→ How Zero Trust protects agent actions in real time.→ What to do before connecting LLMs to internal tools. Read more:.
0
1
2
@pomerium_io
Pomerium
17 days
AX + MCP + Netlify
0
0
2
@pomerium_io
Pomerium
17 days
Let's Explore Langflow
0
0
3
@pomerium_io
Pomerium
18 days
OAuth ≠ secure by default. Proxy-enforced OAuth is mandatory, not optional. What do MCP Security Best Practices actually require and where are current implementations are falling short?. Find your answers on @nickytonline's latest @thenewstack piece:.
0
2
6
@pomerium_io
Pomerium
18 days
𝟭:𝟭𝟱𝗣𝗠 𝗘𝗧:.@JavaSquip, Head of AX Architecture at Netlify discusses AX, MCPs, and using Netlify to ship ideas to production.
Tweet media one
0
0
2
@pomerium_io
Pomerium
18 days
𝟭𝟭𝗔𝗠 𝗘𝗧:.AI Engineer @TejasKumar_ shares about the Langflow project, a new, visual framework for building multi-agent and RAG applications. It is open-source, Python-powered, fully customizable, and LLM and vector store agnostic.
Tweet media one
1
0
1
@pomerium_io
Pomerium
18 days
Tomorrow, we have an incredible guest speaker lineup for our livestreams hosted by @nickytonline! Tune in and listen to what @TejasKumar_ and @JavaSquip have to say about building and shipping LLMs and MCPs.
Tweet media one
1
4
6
@pomerium_io
Pomerium
19 days
"How do we build these microservice architectures and serverless apps?". Brian Rinaldi joined @nickytonline to discuss @localstack, an open-core tool that lets developers run a complete AWS cloud environment on their laptop for faster, cost-effective development and testing.
0
0
4
@pomerium_io
Pomerium
20 days
We recently synced with @monkchips and.@KateHolterhoff at @redmonk on how MCP is here—and how we've been securing it. Real-time, context-aware authorization is the key to securing MCP and agentic access. Explore what breaks with agents and what to do:.
0
1
5