Glasgow’s Wonka Fiasco is a Scary Case of AI Abuse
With the increasing lack of anonymity on the internet, users and organisations alike are looking to implement a VPN setup within their system in order to gain a stronger sense of security. In countries with strong firewalls such as China, businesses prioritise the use of VPNs in order to open themselves up to the global market. With that said, a weak VPN setup can often cause severe security problems within their organisation.
Companies are now forcing their workforce to work from home, and while it's granted a huge amount of flexibility and has yielded some overwhelmingly positive results for organisations, it comes with security risks. When organisations implement VPNs, it means that they are extending their full network into their home device and are actually allowing more entry points for potential adversaries to commit security offenses.
Rejecting the VPN Setup in Favour of Zero Trust Network Access Models
More modern practices are favouring Zero Trust Network Access models, or ZTNAs, as a way to assist organisations with hybrid working. ZTNA is an architecture that is fundamentally different from a VPN setup and allows users to operate on a separate network. In this podcast, our Head of Content Max Kurton speaks to Kurt Glazemakers, Chief Technology Officer at Appgate. They talk about the future of the ZTNA industry, the problems organisations have in switching from a VPN setup to a ZTNA and the drawbacks of using a VPN.
Join 34,209 IT professionals who already have a head start
Censornet: Newlife Sees Cyber Threats Slashed to Zero
Censornet: How to Safeguard 1,500 Users by Going Beyond Web Security
FileCloud: Connecting Your Content Collaboration and Security Strategy
Censornet: Safeguarding the Most Vulnerable People – and Their Data
Censornet: Protecting Staff in a Perimeter-Free World
Cyber Security & Cloud Congress North America Unveils Esteemed Speaker Lineup
Over two-thirds of IT security decision-makers report an increase in cybersecurity budgets for 2024
Stratio: Why Data Fabric is the only pathway to enterprise Generative AI
Pentera: Automated Security Validation and Empowering Pen Testing Teams
Ontotext: Demystifying Semantic Standards and Knowledge Graphs