How do you implement cryptography for top secret information exchange foreseeing a post quantum scenario soon and what types of algorithms do you use? What about network security, are VPN keys are more secure?
CISO in Software, 10,001+ employees
I think we need to be patient and wait for approved NIST algorithms and not rush ahead.Director of IT in Government, 10,001+ employees
A burning platform, money, and a strong partnership of industry, academia, and government. And to the second questions Zero Trust appears to be the rising model to replace the traditional huge pipe VPN. Chief Information Security Officer in Healthcare and Biotech, 1,001 - 5,000 employees
Zero trust architecture can be a good option Director of Network Transformation, Self-employed
Agree with a few of the comments made below. Move to a Zero Trust framework. VPNs, because they place the user/device directly on the network, are security challenges. Better to broker access with modern ZTNA solutions. You gain multiple factors to determine access policies and most critically, visibility. Content you might like
Yes68%
No32%
218 PARTICIPANTS
Yes65%
No24%
Unsure9%
Other (tell us in the comments)2%
156 PARTICIPANTS
Product development engineer in Manufacturing, 201 - 500 employees
whatttCTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.