{"feed_type":"Atom","id":"tag:blogs.akamai.com,2019-07-30://2","title":{"content_type":"text/plain","src":null,"content":"The Akamai Blog"},"updated":"2019-07-30T15:02:05Z","authors":[],"description":null,"links":[{"href":"https://blogs.akamai.com/","rel":"alternate","media_type":"text/html","href_lang":null,"title":null,"length":null},{"href":"http://feeds.feedburner.com/TheAkamaiBlog","rel":"self","media_type":"application/atom+xml","href_lang":null,"title":null,"length":null},{"href":"http://pubsubhubbub.appspot.com/","rel":"hub","media_type":null,"href_lang":null,"title":null,"length":null}],"categories":[],"contributors":[],"generator":{"content":"Movable Type Pro 5.2.13","uri":"http://www.sixapart.com/movabletype/","version":null},"icon":null,"language":null,"logo":null,"published":null,"rating":null,"rights":null,"ttl":null,"entries":[{"id":"tag:blogs.akamai.com,2019://2.3337","title":{"content_type":"text/plain","src":null,"content":"Time to Transfer Risk: Why Security Complexity & VPNs Are No Longer Sustainable"},"updated":"2019-07-30T15:02:05Z","authors":[{"name":"Lorenz Jakober","uri":null,"email":null}],"content":{"body":"<p>We all heed the gospel of patching, but as recent incidents made clear, even cutting-edge disruptors struggle to patch everything, everywhere, and all the time.</p>\n <img src=\"http://feeds.feedburner.com/~r/TheAkamaiBlog/~4/NnQEuqRSyug\" height=\"1\" width=\"1\" alt=\"\"/>","content_type":"text/html","length":null,"src":null},"links":[{"href":"http://feedproxy.google.com/~r/TheAkamaiBlog/~3/NnQEuqRSyug/time-to-transfer-risk-why-security-complexity-vpns-are-no-longer-sustainable.html","rel":"alternate","media_type":"text/html","href_lang":null,"title":null,"length":null}],"summary":{"content_type":"text/plain","src":null,"content":"Now, there are many reasons to isolate your infrastructure from the Internet. Minimizing the number of exposed things not only reduces risk, it also reduces operational complexity. VPNs are counter to this. VPNs make it so you aren't exposing all of your applications publicly in a DMZ, which is good. But for the most part, they still provide access to the corporate network to get access to corporate apps. Definitely bad. At this point, I think we all agree that moats and castles belong in the past."},"categories":[{"term":"Zero Trust","scheme":"http://www.sixapart.com/ns/types#category","label":null,"subcategories":[]},{"term":"ssl","scheme":"http://www.sixapart.com/ns/types#tag","label":"SSL","subcategories":[]},{"term":"zerotrust","scheme":"http://www.sixapart.com/ns/types#tag","label":"Zero Trust","subcategories":[]}],"contributors":[],"published":"2019-07-30T16:00:00Z","source":null,"rights":null,"media":[],"language":"en-us","base":"https://blogs.akamai.com/"}]}