<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>QuickZTNA Blog</title><description>Post-quantum ZTNA, compliance, and mesh VPN engineering notes. Primary-sourced, technical, and honest.</description><link>https://quickztna.com/</link><language>en-us</language><item><title>Why We Ship Post-Quantum on the Free Tier: A Pricing Manifesto</title><link>https://quickztna.com/blog/post-quantum-free-tier-manifesto/</link><guid isPermaLink="true">https://quickztna.com/blog/post-quantum-free-tier-manifesto/</guid><description>Post-quantum cryptography protects against harvest-now-decrypt-later. That threat hits free-tier users too. Why QuickZTNA refuses to paywall quantum safety.</description><pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>pricing</category><category>manifesto</category><category>post-quantum</category><category>free-tier</category><category>philosophy</category><author>QuickZTNA Founders</author></item><item><title>The 2026 Post-Quantum Migration Timeline: Every Major Deadline on One Page</title><link>https://quickztna.com/blog/post-quantum-migration-timeline/</link><guid isPermaLink="true">https://quickztna.com/blog/post-quantum-migration-timeline/</guid><description>Post-quantum cryptography has a migration timeline set by regulators, standards bodies, and vendors. Every known deadline through 2035 with primary sources.</description><pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>post-quantum-timeline</category><category>migration</category><category>cnsa-2-0</category><category>nis2</category><category>cryptography</category><author>QuickZTNA Engineering</author></item><item><title>17 ZTNA Metrics Every CISO Should Actually Track in 2026</title><link>https://quickztna.com/blog/ztna-metrics-for-cisos/</link><guid isPermaLink="true">https://quickztna.com/blog/ztna-metrics-for-cisos/</guid><description>Vendor decks quote ZTNA statistics you cannot verify. Your board wants metrics from your own environment. 17 that matter, with formulas and how to collect them.</description><pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>ztna-metrics</category><category>kpis</category><category>ciso</category><category>security-operations</category><category>measurement</category><author>QuickZTNA Engineering</author></item><item><title>Kubernetes Zero Trust: Replacing kubectl proxy With a Mesh</title><link>https://quickztna.com/blog/kubernetes-zero-trust/</link><guid isPermaLink="true">https://quickztna.com/blog/kubernetes-zero-trust/</guid><description>Developers on kubectl-proxy-plus-VPN hit pain at team scale. Kubernetes Zero Trust uses identity-aware mesh access, SPIFFE identities, and per-namespace policy instead.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>kubernetes</category><category>zero-trust</category><category>spiffe</category><category>mesh</category><category>technical</category><author>QuickZTNA Engineering</author></item><item><title>Zero Trust for Healthcare: 200 Clinics Without a Hub</title><link>https://quickztna.com/blog/zero-trust-healthcare/</link><guid isPermaLink="true">https://quickztna.com/blog/zero-trust-healthcare/</guid><description>Healthcare has unusual network properties — distributed clinics, legacy medical devices, HIPAA, strict uptime. How Zero Trust architecture fits, concretely.</description><pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate><category>industry</category><category>healthcare</category><category>hipaa</category><category>zero-trust</category><category>distributed-networks</category><author>QuickZTNA Engineering</author></item><item><title>WireGuard vs OpenVPN vs IPsec: A 2026 Engineering Comparison</title><link>https://quickztna.com/blog/wireguard-vs-openvpn-vs-ipsec/</link><guid isPermaLink="true">https://quickztna.com/blog/wireguard-vs-openvpn-vs-ipsec/</guid><description>WireGuard, OpenVPN, and IPsec are the three VPN protocols that matter in 2026. Performance, security, code size, and operational simplicity compared.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>wireguard</category><category>openvpn</category><category>ipsec</category><category>vpn</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>WireGuard Mesh Network: Zero to 100 Peers Without a Config File</title><link>https://quickztna.com/blog/wireguard-mesh-network/</link><guid isPermaLink="true">https://quickztna.com/blog/wireguard-mesh-network/</guid><description>Building a WireGuard mesh by hand becomes painful at about 10 peers. What breaks, why coordination servers exist, and how to scale to 100+ peers.</description><pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>wireguard-mesh</category><category>wireguard</category><category>mesh-vpn</category><category>technical</category><author>QuickZTNA Engineering</author></item><item><title>SASE vs ZTNA vs SSE: Which Acronym Matters for a 50-Person Team?</title><link>https://quickztna.com/blog/sase-vs-ztna-vs-sse/</link><guid isPermaLink="true">https://quickztna.com/blog/sase-vs-ztna-vs-sse/</guid><description>SASE, ZTNA, and SSE overlap. This explains each term using Gartner&apos;s original definitions, shows how they relate, and recommends what a 50-person team actually needs.</description><pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate><category>fundamentals</category><category>sase</category><category>ztna</category><category>sse</category><category>fundamentals</category><author>QuickZTNA Engineering</author></item><item><title>What Is ZTNA? A Plain-English Guide to Zero Trust Network Access in 2026</title><link>https://quickztna.com/blog/what-is-ztna/</link><guid isPermaLink="true">https://quickztna.com/blog/what-is-ztna/</guid><description>Zero Trust Network Access replaces &apos;inside is trusted&apos; with &apos;every request is verified&apos;. Plain-English explanation of the history, mechanics, and how to build it.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>fundamentals</category><category>ztna</category><category>zero-trust</category><category>nist-800-207</category><category>beyondcorp</category><category>fundamentals</category><author>QuickZTNA Engineering</author></item><item><title>ZTNA vs VPN: 8 Real Differences (With Diagrams)</title><link>https://quickztna.com/blog/ztna-vs-vpn/</link><guid isPermaLink="true">https://quickztna.com/blog/ztna-vs-vpn/</guid><description>ZTNA and VPN are often pitted against each other. The real picture is more nuanced. Here are the eight differences that actually matter when you choose — with diagrams.</description><pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate><category>fundamentals</category><category>ztna-vs-vpn</category><category>zero-trust</category><category>vpn</category><category>fundamentals</category><category>wireguard</category><author>QuickZTNA Engineering</author></item><item><title>Open-Source vs Managed ZTNA: A Decision Framework</title><link>https://quickztna.com/blog/open-source-vs-managed-ztna/</link><guid isPermaLink="true">https://quickztna.com/blog/open-source-vs-managed-ztna/</guid><description>Open-source ZTNA (OpenZiti, Headscale, NetBird) vs managed products. A decision framework that puts the trade-offs in engineering hours, not ideology.</description><pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate><category>comparison</category><category>open-source-ztna</category><category>managed-ztna</category><category>ztna</category><category>decision-framework</category><author>QuickZTNA Engineering</author></item><item><title>Device Posture Checks That Actually Catch Unmanaged Laptops</title><link>https://quickztna.com/blog/device-posture-checks/</link><guid isPermaLink="true">https://quickztna.com/blog/device-posture-checks/</guid><description>Most device-posture checks are checkbox exercises. Twelve signals that actually catch unmanaged laptops, how to enforce continuously, what auditors expect.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>technical</category><category>device-posture</category><category>ztna</category><category>continuous-authentication</category><category>mdm</category><category>edr</category><author>QuickZTNA Engineering</author></item><item><title>SOC 2 Controls for Remote Access: 11 You&apos;ll Get Audited On</title><link>https://quickztna.com/blog/soc-2-remote-access-controls/</link><guid isPermaLink="true">https://quickztna.com/blog/soc-2-remote-access-controls/</guid><description>SOC 2 is based on AICPA&apos;s Trust Services Criteria. The 11 specific Common Criteria auditors test for VPN, ZTNA, and remote-work deployments.</description><pubDate>Sun, 03 May 2026 00:00:00 GMT</pubDate><category>compliance</category><category>soc-2</category><category>compliance</category><category>trust-services-criteria</category><category>ztna</category><category>remote-access</category><author>QuickZTNA Engineering</author></item><item><title>HIPAA-Compliant VPN in 2026: What the Rule Actually Says About Encryption</title><link>https://quickztna.com/blog/hipaa-compliant-vpn-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/hipaa-compliant-vpn-2026/</guid><description>HIPAA encryption is &apos;addressable&apos;, not optional. The Security Rule technical safeguards for remote access, and what a HIPAA-aligned VPN looks like in 2026.</description><pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate><category>compliance</category><category>hipaa</category><category>healthcare</category><category>security-rule</category><category>vpn</category><category>ztna</category><author>QuickZTNA Engineering</author></item><item><title>Self-Hosting Headscale vs a Managed Coordination Server: Honest Total Cost</title><link>https://quickztna.com/blog/headscale-vs-managed-coordination/</link><guid isPermaLink="true">https://quickztna.com/blog/headscale-vs-managed-coordination/</guid><description>Headscale is an open-source Tailscale-compatible coordination server. Self-host saves subscription cost but adds operational cost. Honest total-cost model.</description><pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate><category>comparison</category><category>headscale</category><category>tailscale</category><category>self-host</category><category>mesh-vpn</category><category>total-cost</category><author>QuickZTNA Engineering</author></item><item><title>Cloudflare Access Alternatives for Teams That Want a Real Agent</title><link>https://quickztna.com/blog/cloudflare-access-alternatives/</link><guid isPermaLink="true">https://quickztna.com/blog/cloudflare-access-alternatives/</guid><description>Cloudflare Access is an edge-native identity proxy, not a device-agent mesh. If you need a real agent, data-plane control, or self-host — these alternatives.</description><pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>cloudflare-access-alternative</category><category>ztna</category><category>mesh-vpn</category><category>wireguard</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>NetBird vs Tailscale vs QuickZTNA: A Developer-Focused Comparison</title><link>https://quickztna.com/blog/netbird-vs-tailscale-vs-quickztna/</link><guid isPermaLink="true">https://quickztna.com/blog/netbird-vs-tailscale-vs-quickztna/</guid><description>NetBird, Tailscale, and QuickZTNA — three WireGuard mesh products for developers. Architecture, licensing, features, and post-quantum posture compared.</description><pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>netbird</category><category>tailscale</category><category>quickztna</category><category>wireguard</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>Twingate Alternative: 5 Options That Don&apos;t Lock You In</title><link>https://quickztna.com/blog/twingate-alternative/</link><guid isPermaLink="true">https://quickztna.com/blog/twingate-alternative/</guid><description>Twingate is an agent-based ZTNA. Looking for an alternative — for licensing, protocol, pricing, or post-quantum reasons? Five serious options in 2026.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>twingate-alternative</category><category>ztna</category><category>mesh-vpn</category><category>comparison</category><category>wireguard</category><author>QuickZTNA Engineering</author></item><item><title>The Best Tailscale Alternatives in 2026: A Fair, Factual Comparison</title><link>https://quickztna.com/blog/tailscale-alternatives-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/tailscale-alternatives-2026/</guid><description>Tailscale popularised mesh VPN. Honest comparison of the best Tailscale alternatives in 2026 by architecture, licensing, pricing, and post-quantum posture.</description><pubDate>Wed, 29 Apr 2026 00:00:00 GMT</pubDate><category>comparison</category><category>tailscale-alternative</category><category>mesh-vpn</category><category>ztna</category><category>wireguard</category><category>comparison</category><author>QuickZTNA Engineering</author></item><item><title>ANSSI PQC Transition Plan: France&apos;s Deadlines for Public Sector Networks</title><link>https://quickztna.com/blog/anssi-pqc-transition-plan/</link><guid isPermaLink="true">https://quickztna.com/blog/anssi-pqc-transition-plan/</guid><description>ANSSI, France&apos;s cyber agency, has a three-phase plan for post-quantum. What each phase requires and how to align ZTNA with ANSSI qualification.</description><pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>anssi</category><category>france</category><category>post-quantum</category><category>qualification</category><category>compliance</category><author>QuickZTNA Engineering</author></item><item><title>BSI TR-02102-1 and Post-Quantum: Germany&apos;s 2026 Crypto Baseline</title><link>https://quickztna.com/blog/bsi-post-quantum-transition-2026/</link><guid isPermaLink="true">https://quickztna.com/blog/bsi-post-quantum-transition-2026/</guid><description>Germany&apos;s BSI TR-02102-1 sets the cryptographic baseline for federal and regulated entities. Current recommendations, PQ transition, and what it means.</description><pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>bsi</category><category>tr-02102</category><category>post-quantum</category><category>germany</category><category>compliance</category><author>QuickZTNA Engineering</author></item><item><title>DORA Compliance for Financial Entities: Network Resilience in 10 Steps</title><link>https://quickztna.com/blog/dora-compliance-network-resilience/</link><guid isPermaLink="true">https://quickztna.com/blog/dora-compliance-network-resilience/</guid><description>DORA has applied to EU financial entities since January 2025. Articles 5 through 27 translated into ten concrete network-resilience implementation steps.</description><pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>dora</category><category>financial-regulation</category><category>ict-risk-management</category><category>eu-regulation</category><category>regulation-2022-2554</category><author>QuickZTNA Engineering</author></item><item><title>Post-Quantum VPN: 6 Questions to Ask Your Current Vendor</title><link>https://quickztna.com/blog/post-quantum-vpn-vendor-questions/</link><guid isPermaLink="true">https://quickztna.com/blog/post-quantum-vpn-vendor-questions/</guid><description>Most VPN vendors claim post-quantum readiness. Six specific questions separate real implementations from marketing — with honest answers from 2026.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>post-quantum-vpn</category><category>quantum-safe</category><category>vendor-evaluation</category><category>ztna</category><category>wireguard</category><author>QuickZTNA Engineering</author></item><item><title>NIS2 Directive Remote Access Requirements: A Builder&apos;s Checklist</title><link>https://quickztna.com/blog/nis2-remote-access-requirements/</link><guid isPermaLink="true">https://quickztna.com/blog/nis2-remote-access-requirements/</guid><description>NIS2 has applied to EU organisations since October 2024. Remote-access-specific reading of Article 21 with a concrete implementation checklist.</description><pubDate>Sun, 26 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>nis2</category><category>eu-cybersecurity</category><category>directive-2022-2555</category><category>remote-access</category><category>compliance</category><author>QuickZTNA Engineering</author></item><item><title>NSA CNSA 2.0: Every Deadline DoD Contractors Need to Know</title><link>https://quickztna.com/blog/cnsa-2-0-deadlines/</link><guid isPermaLink="true">https://quickztna.com/blog/cnsa-2-0-deadlines/</guid><description>CNSA 2.0 is the NSA&apos;s post-quantum algorithm suite for US National Security Systems. Approved algorithms, transition deadlines, and what DoD vendors must do.</description><pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate><category>compliance</category><category>cnsa-2-0</category><category>nsa</category><category>post-quantum</category><category>dod</category><category>compliance</category><category>nss</category><author>QuickZTNA Engineering</author></item><item><title>Hybrid Key Exchange X25519 + ML-KEM-768: The Complete Guide</title><link>https://quickztna.com/blog/hybrid-key-exchange-x25519-mlkem/</link><guid isPermaLink="true">https://quickztna.com/blog/hybrid-key-exchange-x25519-mlkem/</guid><description>Hybrid post-quantum key exchange combines X25519 with ML-KEM-768 so a session stays secret if either primitive holds. Construction, code, failure modes.</description><pubDate>Sat, 25 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>hybrid-key-exchange</category><category>x25519</category><category>ml-kem</category><category>post-quantum</category><category>cryptography</category><author>QuickZTNA Engineering</author></item><item><title>Harvest Now, Decrypt Later: Why Your VPN Traffic Is Already Compromised</title><link>https://quickztna.com/blog/harvest-now-decrypt-later/</link><guid isPermaLink="true">https://quickztna.com/blog/harvest-now-decrypt-later/</guid><description>Harvest now, decrypt later is a real attack model. Nation-state actors record encrypted traffic today to decrypt with future quantum computers.</description><pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>harvest-now-decrypt-later</category><category>post-quantum</category><category>threat-model</category><category>quantum-computing</category><category>cryptography</category><author>QuickZTNA Engineering</author></item><item><title>ML-KEM-768 Explained: The Quantum-Safe Algorithm in Every QuickZTNA Tunnel</title><link>https://quickztna.com/blog/ml-kem-768-explained/</link><guid isPermaLink="true">https://quickztna.com/blog/ml-kem-768-explained/</guid><description>ML-KEM-768 is the NIST-standardised post-quantum KEM in every QuickZTNA tunnel. How it works, real benchmarks, and why we pair it with X25519.</description><pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate><category>post-quantum</category><category>ml-kem</category><category>post-quantum</category><category>fips-203</category><category>wireguard</category><category>cryptography</category><author>QuickZTNA Engineering</author></item></channel></rss>