{
  "$type": "site.standard.document",
  "bskyPostRef": {
    "cid": "bafyreihzmaa5deqtypl4dfeiv2ktcu4hyyjqw7ddrwwyd47g56v6jgomqq",
    "uri": "at://did:plc:7x3s3thr2mmsuulodm5wmnrx/app.bsky.feed.post/3ml525fztfav2"
  },
  "coverImage": {
    "$type": "blob",
    "ref": {
      "$link": "bafkreidj3sxg7u7dr64we6pbsfla6ebm72vysjzuczligqf5cw2qnvtjbm"
    },
    "mimeType": "image/png",
    "size": 323289
  },
  "description": "I'm thrilled to share that the second edition of the Cybersecurity Architect's Handbook is officially out in the world. ",
  "path": "/found-in-the-wild/",
  "publishedAt": "2026-05-05T20:38:05.000Z",
  "site": "https://secdoc.tech",
  "tags": [
    "Murat Balaban",
    "Zenarmor"
  ],
  "textContent": "I'm thrilled to share that the **second edition of the Cybersecurity Architect's Handbook** is officially out in the world. Even better: it just hit **#1 New Release on Amazon** in its category. To everyone who pre-ordered, shared, or has been quietly waiting for this update — thank you. This launch belongs to you as much as it does to me.\n\n## What the Book Is About\n\nThe handbook is exactly what the subtitle promises: _an architect's guide to designing, building, and defending the modern enterprise_. It's written for the people who actually have to make the architectural decisions that determine whether an organization is resilient or just lucky — security architects, senior engineers stepping into architecture roles, and the technology leaders who need to evaluate the work.\n\nThis isn't a survey of buzzwords. It's a practitioner's playbook grounded in how real environments are designed, where they tend to fail, and how to build them so they hold up under pressure.\n\n## What's New in the Second Edition\n\nThe threat landscape has not exactly stood still since the first edition, and neither has this book. The second edition has been substantially updated and expanded, with deeper coverage of the architectures defining modern enterprise security:\n\n  * **Zero Trust and ZTNA** get a much more thorough treatment, including a hands-on **lab exercise using Zenarmor** so you can actually work through a Zero Trust Network Access deployment instead of just reading about one.\n  * **Illustrative use cases** walk through real architectures end-to-end. The mid-sized manufacturer case study, for example, takes you through a full transformation — identity, segmentation, visibility, and how the pieces fit together under operational constraints.\n  * Updated guidance throughout on the patterns, trade-offs, and decision frameworks architects are using right now.\n\n\n\nThe goal was to make this the book I wish I'd had earlier in my own career: opinionated where it should be, practical everywhere else, and honest about where the hard parts actually live.\n\n## A Huge Thank You\n\nA special shout-out to Murat Balaban, Founder and CEO of Zenarmor, who gave the launch a wonderful boost on X and called out the Zenarmor coverage in the ZTNA chapter. Endorsements from practitioners in the trenches mean more than any marketing copy ever could.\n\n> _\"The book is #1 New Release on Amazon in its category, and a high-value resource for anyone pursuing a path to be a security architect.\"_ — Murat Balaban\n\nThanks, Murat. The honor is mine.\n\n## Get the Book\n\nThe Cybersecurity Architect's Handbook, 2nd Edition is available on Amazon now. If you pick it up, I'd love to hear what you think — and especially how the labs work out for you. Drop a review, send a note, or tag me when you put the patterns into practice.\n\n**_Build well, defend better._**",
  "title": "Found in the Wild!",
  "updatedAt": "2026-05-05T20:38:05.405Z"
}