Elon Musk’s Neuralink Brain Chip Gets FDA Approval for Human Trials
ZTNA Models: Fixing Flaws in the VPN Setup

With the increasing lack of anonymity on the internet, users and organisations alike are looking to implement a VPN setup within their system in order to gain a stronger sense of security. In countries with strong firewalls such as China, businesses prioritise the use of VPNs in order to open themselves up to the global market. With that said, a weak VPN setup can often cause severe security problems within their organisation.
Companies are now forcing their workforce to work from home, and while it's granted a huge amount of flexibility and has yielded some overwhelmingly positive results for organisations, it comes with security risks. When organisations implement VPNs, it means that they are extending their full network into their home device and are actually allowing more entry points for potential adversaries to commit security offenses.
Rejecting the VPN Setup in Favour of Zero Trust Network Access Models
More modern practices are favouring Zero Trust Network Access models, or ZTNAs, as a way to assist organisations with hybrid working. ZTNA is an architecture that is fundamentally different from a VPN setup and allows users to operate on a separate network. In this podcast, our Head of Content Max Kurton speaks to Kurt Glazemakers, Chief Technology Officer at Appgate. They talk about the future of the ZTNA industry, the problems organisations have in switching from a VPN setup to a ZTNA and the drawbacks of using a VPN.
Trending Content
The Golden Age of AI is Here. Are Businesses Ready?

Red Sift and Third Door Media: Why Marketers Need Email Security Too

Red Sift: Why Modern Brand Protection Starts With Securing Your Domain

UK Prime Minister Rishi Sunak Meets Tech CEOs to Discuss 'Existential Threats’ of AI

Intelligence expert and star of Channel 4’s Hunted, Danni Brooke, to spotlight the role of women in cyber at Infosecurity Europe 2023

5 Key Steps to Implementing CI/CD in your Software Development Lifecycle

GDPR Five Years on: How Regulation Has Defined Innovation
