How do you implement cryptography for top secret information exchange foreseeing a post quantum scenario soon and what types of algorithms do you use? What about network security, are VPN keys are more secure?

4.7k viewscircle icon1 Upvotecircle icon5 Comments
Sort by:
ceo in Softwarea year ago

VPNs have many known vulnerabilities, and TunnelVision pretty much rendered most (if not all) VPNs vulnerable.  I'd use a Zero Trust architecture like a Software Defined Perimeter (SDP), especially one that is encrypted end-to-end at Layer 2. At NVIS AI, we do this, and we've also partnered recently with a company on the bleeding edge of cryptology, using a dynamic manifold projection system, ensuring that each cryptographic nonce public key is unique and non-reusable in replay attacks.  Connect with me if you wish to learn more.

Director of Network Transformation2 years ago

Agree with a few of the comments made below.  Move to a Zero Trust framework.  VPNs, because they place the user/device directly on the network, are security challenges.  Better to broker access with modern ZTNA solutions.  You gain multiple factors to determine access policies and most critically, visibility.  

Chief Information Security Officer in Healthcare and Biotech2 years ago

Zero trust architecture can be a good option  

Mission Diplomatic Technology Officer in Government2 years ago

A burning platform, money, and a strong partnership of industry, academia, and government. And to the second questions Zero Trust appears to be the rising model to replace the traditional huge pipe VPN. 

Lightbulb on2
CISO in Software2 years ago

I think we need to be patient and wait for approved NIST algorithms and not rush ahead.

Lightbulb on1

Content you might like

Always required – Security must formally review and approve every change request.11%

Required for security-impacting changes – Security reviews only changes flagged as having potential security implications. Please comment : Who decides which changes require security review and which do not ? Is this determination manual or automated? How do you avoid gaps or oversights in this process ?82%

Not required – Security does not review changes submitted CAB/RAB by other teams. 7%

Risk-based or automated – Security involvement is determined by a tiered model or automated risk scoring within ITSM.

View Results

Invest more in eCommerce34%

Maintain the current investment in eCommerce60%

Invest less in eCommerce4%

View Results