Get a Demo
    Browse by topic
    Subscribe to our news
    Picture of Mike Zelle

    Posts written by Mike Zelle

    Mike Zelle is a Solutions Director at Zentera, focused on driving new business in the US West. Mike brings over 25+ years of experience spanning customer engagement with an emphasis on digital transformation, IT operations efficiency and data/cost optimization. Previously responsible for global network design, cluster farm implementation, product development and cloud architecture, Mike also supported AI-based technology to enable new forms of business operations in his most recent previous role.
    Having fully led 2 global teams previously and building another, Zelle’s deep technical background, business acumen, relationships across each organization and with channel and technology partners has influenced significant transformational change in the way several organizations build, offer and sell expanding solution portfolios at Riverbed, Zinier & Tanium. Zentera operates in a similar manner with a focus in new areas of expanding portfolio that enables real-time data analysis and control of security estates, which now included Agentic AI.
    Throughout his career, Zelle has donated his time and skillset to a number of non-profit, community-focused entities including the Linux Foundation and IT Disaster Resource Center emergency support organization (inc’d the CRT Cyber Response Team).


    Zero Trust

    Closing the Shadow AI Gap: Why Traditional Zero Trust Is Not Enough

    In a previous discussion post on the "AI Agent Security Enforcement Gap," we explored how policy drift and the divergence between intended controls and actual enforcement create strategic liabilities. While we established that an application-centric ...
    Read

    Zero Trust

    Reducing Policy Drift

    Why Zero Trust at the Application Layer Is the Future of Production Security
    Read

    The Silent Crisis in Cybersecurity: Why Secrets Management Is the New Battleground

    The most dangerous security breaches today don’t start with zero-days or nation-state sophistication. They start with something far more mundane: a leaked API key, a forgotten service account, a long-lived token that nobody remembered existed.
    Read

    Cybersecurity

    Hardening Your DMZ Against AI-Powered and Autonomous Attacks

    For decades, the DMZ (demilitarized zone) has been treated as a reliable buffer between the internet and “trusted” internal systems. Expose a limited set of services, wrap them in firewalls, monitor traffic, and assume anything that makes it past ...
    Read

    Zero Trust

    RBAC vs ABAC (and PBAC): How Access Control Models Evolved for the Zero Trust Era

    Access control has evolved from simple role assignments to dynamic, policy-driven systems. The ongoing debate of RBAC vs ABAC highlights how organizations are adapting to increasingly complex, distributed IT environments - and how PBAC extends these ...
    Read

    Zero Trust

    Your Endpoint Tools Just Stopped Protecting Windows 10 - Now What?

    The Security Cliff: Windows 10 Support Is Ending — Gradually On October 14, 2025, Microsoft officially ended free support for Windows 10. While paid Extended Security Updates (ESU) will remain available through October 13, 2026, that program only ...
    Read

    Software-Defined Perimeter Explained

    The New Edge of Zero Trust Security In today’s borderless world, the traditional concept of a network perimeter no longer holds up. Users connect from anywhere. Applications span data centers, clouds, and OT networks. And third-party partners often ...
    Read

    Stay Connected

    Sign up for our newsletter and to be notified of product, solution, and company news.