CPOB:RPT:1015:VPN

Download

VPN Security: Trust, But Verify

Virtual private networks (VPNs) were developed to allow remote devices to communicate as if they were directly connected to a private network, while benefiting from security and management policies. However, blindly trusting VPN vendors' security claims puts your customers' data at risk. Many popular VPN services still rely on outdated technologies; for example, they may protect only IPv4 traffic, even though they handle IPv6. This Report looks at how data can be leaked or hijacked from a VPN and the steps you can take to ensure your customers' VPN connections are secure.

  • Find out how IoT is fueling the adoption of IPv6.
  • Learn how the migration from IPv4 to IPv6 is creating security gaps.
  • Review expert tips for adopting IPv6.

About the Author

Michael Cobb, CISSP-ISSAP, is 20-year veteran of IT security with a passion for making industry best practices easier to understand and implement. As an adviser on security controls and information handling practices to companies and government agencies large and small, Cobb has helped numerous organizations achieve ISO 27001 certification and successfully migrate data and services to the cloud. Cobb has also worked with CESG, the Information Security arm of GCHQ, to promote security best practices in government. A renowned author and presenter, Cobb has written numerous technical articles and webcasts for leading IT publications as well as the book “IIS Security.” He has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS).