<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>LayerV Blog</title>
    <link>https://layerv.ai/blog/</link>
    <description>Cybersecurity insights, product updates, and thought leadership from the LayerV team.</description>
    <language>en-us</language>
    <lastBuildDate>Sat, 11 Apr 2026 06:57:58 GMT</lastBuildDate>
    <atom:link href="https://layerv.ai/blog/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Beyond Zscaler: Why Network Hiding Beats Application-Layer Zero Trust</title>
      <link>https://layerv.ai/blog/zscaler-alternative-network-hiding/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/zscaler-alternative-network-hiding/</guid>
      <description>Zscaler Private Access controls access at the application layer. Network hiding eliminates visibility at the network layer. For infrastructure that should be invisible, the difference is fundamental.</description>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Justin Posey</dc:creator>
      <category>Zscaler</category>
      <category>ZTNA</category>
      <category>Network Hiding</category>
      <category>Zero Trust</category>
      <category>Comparison</category>
    </item>
    <item>
      <title>Ransomware Prevention: Why Hiding Beats Detecting</title>
      <link>https://layerv.ai/blog/ransomware-prevention-network-hiding/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/ransomware-prevention-network-hiding/</guid>
      <description>Ransomware groups rely on finding exposed infrastructure before encrypting it. Network hiding eliminates the reconnaissance phase, preventing ransomware attacks before they begin.</description>
      <pubDate>Fri, 13 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Joe Ollis</dc:creator>
      <category>Ransomware</category>
      <category>Ransomware Prevention</category>
      <category>Network Hiding</category>
      <category>Attack Surface</category>
      <category>Preemptive Security</category>
    </item>
    <item>
      <title>The White House Just Told Everyone What We&apos;ve Been Saying for Two Years</title>
      <link>https://layerv.ai/blog/white-house-cyber-strategy/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/white-house-cyber-strategy/</guid>
      <description>The White House released its national cyber strategy with initial access denial as explicit policy. Here&apos;s what it means for cloud security teams and why infrastructure invisibility is now a national priority.</description>
      <pubDate>Sat, 07 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Justin Posey</dc:creator>
      <category>White House</category>
      <category>Cyber Strategy</category>
      <category>Initial Access Denial</category>
      <category>Network Hiding</category>
      <category>OpenNHP</category>
    </item>
    <item>
      <title>How to Make AWS Infrastructure Invisible to Attackers</title>
      <link>https://layerv.ai/blog/hide-aws-infrastructure/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/hide-aws-infrastructure/</guid>
      <description>Your AWS ALBs, API Gateways, and EKS clusters are being scanned right now. Here&apos;s how to make them invisible using network hiding — with a DNS change, no agents required.</description>
      <pubDate>Fri, 27 Feb 2026 00:00:00 GMT</pubDate>
      <dc:creator>Joe Ollis</dc:creator>
      <category>AWS</category>
      <category>Cloud Security</category>
      <category>Network Hiding</category>
      <category>Infrastructure Protection</category>
      <category>Attack Surface</category>
    </item>
    <item>
      <title>5 Things ZTNA Can&apos;t Do That Network Hiding Can</title>
      <link>https://layerv.ai/blog/ztna-limitations/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/ztna-limitations/</guid>
      <description>Zero Trust Network Access controls application access but can&apos;t prevent infrastructure discovery. Here are five security gaps that only network-layer hiding can close.</description>
      <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
      <dc:creator>Justin Posey</dc:creator>
      <category>ZTNA</category>
      <category>Network Hiding</category>
      <category>Zero Trust</category>
      <category>Attack Surface</category>
      <category>Security Architecture</category>
    </item>
    <item>
      <title>Zero Trust vs Network Hiding: What Comes After ZTNA</title>
      <link>https://layerv.ai/blog/zero-trust-vs-network-hiding/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/zero-trust-vs-network-hiding/</guid>
      <description>ZTNA verifies identity at the application layer but infrastructure remains visible. Network hiding eliminates visibility at the network layer. Here&apos;s why the next evolution matters.</description>
      <pubDate>Thu, 05 Feb 2026 00:00:00 GMT</pubDate>
      <dc:creator>Ben Chen</dc:creator>
      <category>Zero Trust</category>
      <category>ZTNA</category>
      <category>Network Hiding</category>
      <category>Zscaler</category>
      <category>Cloudflare Access</category>
    </item>
    <item>
      <title>OpenNHP: The IETF Standard Making Infrastructure Invisible</title>
      <link>https://layerv.ai/blog/opennhp-ietf-standard/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/opennhp-ietf-standard/</guid>
      <description>OpenNHP is the Cloud Security Alliance&apos;s Network Hiding Protocol — now an IETF Internet-Draft. Here&apos;s what it is, how it works, and why it matters for the future of cybersecurity.</description>
      <pubDate>Fri, 23 Jan 2026 00:00:00 GMT</pubDate>
      <dc:creator>Justin Posey</dc:creator>
      <category>OpenNHP</category>
      <category>IETF</category>
      <category>Cloud Security Alliance</category>
      <category>Network Hiding</category>
      <category>Open Source</category>
      <category>Standards</category>
    </item>
    <item>
      <title>VPN Replacement in 2026: From Encryption to Invisibility</title>
      <link>https://layerv.ai/blog/vpn-replacement-2026/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/vpn-replacement-2026/</guid>
      <description>VPNs encrypt traffic to visible servers. In 2026, the replacement isn&apos;t a better VPN — it&apos;s making servers invisible. Here&apos;s what the post-VPN world looks like.</description>
      <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
      <dc:creator>Joe Ollis</dc:creator>
      <category>VPN</category>
      <category>VPN Replacement</category>
      <category>Network Hiding</category>
      <category>Remote Access</category>
      <category>Zero Trust</category>
    </item>
    <item>
      <title>How to Stop Port Scanning: Eliminate the Attack Surface Entirely</title>
      <link>https://layerv.ai/blog/stop-port-scanning/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/stop-port-scanning/</guid>
      <description>Port scanning is the first step in every attack. Firewalls and IDS can detect scans but can&apos;t prevent discovery. Network hiding makes port scanning find nothing.</description>
      <pubDate>Fri, 19 Dec 2025 00:00:00 GMT</pubDate>
      <dc:creator>Ben Chen</dc:creator>
      <category>Port Scanning</category>
      <category>Attack Surface</category>
      <category>Network Hiding</category>
      <category>Reconnaissance</category>
      <category>Nmap</category>
    </item>
    <item>
      <title>Preemptive Cybersecurity: Why Detection-First Security Is Failing</title>
      <link>https://layerv.ai/blog/what-is-preemptive-cybersecurity/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/what-is-preemptive-cybersecurity/</guid>
      <description>Detection-based security assumes some attacks will succeed. Preemptive cybersecurity eliminates the conditions that make attacks possible. Here&apos;s why the paradigm is shifting.</description>
      <pubDate>Wed, 03 Dec 2025 00:00:00 GMT</pubDate>
      <dc:creator>Justin Posey</dc:creator>
      <category>Preemptive Security</category>
      <category>Cybersecurity Strategy</category>
      <category>Attack Surface</category>
      <category>Network Hiding</category>
      <category>Zero Trust</category>
    </item>
    <item>
      <title>What is Network Hiding? The Security Model That Eliminates Attack Surface</title>
      <link>https://layerv.ai/blog/what-is-network-hiding/</link>
      <guid isPermaLink="true">https://layerv.ai/blog/what-is-network-hiding/</guid>
      <description>Network hiding makes infrastructure invisible at the network layer. Learn how it works, why it&apos;s different from firewalls and ZTNA, and how the OpenNHP protocol standardizes infrastructure invisibility.</description>
      <pubDate>Wed, 12 Nov 2025 00:00:00 GMT</pubDate>
      <dc:creator>Ben Chen</dc:creator>
      <category>Network Hiding</category>
      <category>OpenNHP</category>
      <category>Attack Surface</category>
      <category>Zero Trust</category>
      <category>Preemptive Security</category>
    </item>
  </channel>
</rss>
