<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Spoiledlunch</title><link>https://072f2ff5.spoiledlunch.pages.dev/</link><description>Nerdy Stuff. Tech Talk. Zero Freshness. Analysis and commentary on GRC, security, and AI.</description><generator>Hugo 0.160.1</generator><language>en-us</language><lastBuildDate>Wed, 15 Apr 2026 11:15:00 -0700</lastBuildDate><atom:link href="https://072f2ff5.spoiledlunch.pages.dev/tags/architecture/" rel="self" type="application/rss+xml"/><item><title>When Zero Trust Meets Reality</title><link>https://072f2ff5.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/</link><pubDate>Wed, 15 Apr 2026 11:15:00 -0700</pubDate><guid>https://072f2ff5.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/</guid><description>
&lt;![CDATA[<p><strong>Article</strong> • April 15, 2026 • 6 min read</p><p><strong>Topics:</strong> Security</p><p>When Zero Trust Meets Reality Zero Trust promises to solve network security by eliminating trust assumptions. The marketing pitch is compelling: assume breach, verify everything, trust nothing. In …</p><p><a href="https://072f2ff5.spoiledlunch.pages.dev/articles/2026-04-15-zero-trust-meets-reality/">Read full analysis →</a></p>
]]></description><author>@spoiledlunch</author><category>Security</category><category>zero trust</category><category>network security</category><category>architecture</category><category>implementation</category></item></channel></rss>