Reworked November 24, 2020 – Now Is the Time to Replace VPN With Zero Trust
…
What Is Wrong With VPN?
The perimeter methodology that VPN relies on makes it particularly vulnerable to attackers, said Steve Tcherchian, chief information security officer at XYPRO, a cybersecurity analytics company, by giving users and devices unfettered access to the network once they have been identified and authenticated at the perimeter. “Attackers love this,” he said. “Once they’re in, they can spend as much time as they need to move around from device to device. In some cases, once authenticated to the VPN, this could mean access to thousands of devices.”
Tcherchian said several recent data breaches can be attributed to this methodology of trust, and it enabled attackers to gain access to everything the vendor or contractor had done in the past. “This is no longer a sustainable security strategy,” he said. “Moving to a Zero Trust model removes that layer of perimeter security. Every user and device, whether outside the VPN or inside no longer has access to devices. Even if they’re inside the VPN, there is no access unless explicitly granted on an as-needed basis.”
…
To read the full article visit reworked.co/
Steve Tcherchian, CISSP, PCI-ISA, PCIP is the Chief Product Officer and Chief Information Security Officer for XYPRO Technology. Steve is on Forbes Technology Council, the NonStop Under 40 executive board, and part of the ANSI X9 Security Standards Committee.
With over 20 years in the cybersecurity field, Steve is responsible for the strategy and innovation of XYPRO’s security product line as well as overseeing XYPRO’s risk, compliance, and security to ensure the best experience for customers in the Mission-Critical computing marketplace.
Steve is an engaging and dynamic speaker who regularly presents on cybersecurity topics at conferences around the world.