How do you implement cryptography for top secret information exchange foreseeing a post quantum scenario soon and what types of algorithms do you use? What about network security, are VPN keys are more secure?

3.3k views1 Upvote4 Comments

CISO in Software, 10,001+ employees
I think we need to be patient and wait for approved NIST algorithms and not rush ahead.
Director of IT in Government, 10,001+ employees
A burning platform, money, and a strong partnership of industry, academia, and government. And to the second questions Zero Trust appears to be the rising model to replace the traditional huge pipe VPN. 
Chief Information Security Officer in Healthcare and Biotech, 1,001 - 5,000 employees
Zero trust architecture can be a good option  
Director of Network Transformation, Self-employed
Agree with a few of the comments made below.  Move to a Zero Trust framework.  VPNs, because they place the user/device directly on the network, are security challenges.  Better to broker access with modern ZTNA solutions.  You gain multiple factors to determine access policies and most critically, visibility.  

Content you might like

CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Read More Comments
39.8k views130 Upvotes318 Comments