You’re invited to join Cloudflare and SecurityWeek for a live webinar on Tuesday, August 22nd we discuss “VPN Replacement: Other ZTNA Superpowers CISOs Should Know”
Organizations are exploring their initial steps in adopting a Zero Trust architecture. Often, this involves strategizing meaningful pilot projects to augment and eventually (mostly) replace their VPNs. But what comes next?
The “aggregation layer” aspect of Zero Trust Network Access (ZTNA) shouldn’t stop at reducing VPN reliance. With roots in both access and connectivity, it launches an organization into a long-term SASE mindset, bringing together both security and networking teams and tech.
Join us on August 22nd at 1PM ET as we discuss ZTNA’s untapped potential to both reduce cyber risk and empower the business to:
- Provide slick experiences to even your riskiest users like contractors, temporary hires, and developers
- Maintain business continuity during critical junctures like M&A and cloud migrations
- Roll our phishing-resistant MFA (like hard keys) everywhere to everyone
- Set the groundwork for a whole roadmap of security use cases even after that VPN is (mostly) gone
No “castle and moat” analogies in this one — we promise!

More from SecurityWeek News
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- In Other News: China Blames NSA for Hack, AI Jailbreaks, Netography Spin-Off
- SecurityWeek to Host Cyber AI & Automation Summit
- US Marks 22 Years Since 9/11 Terrorist Attacks
- In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach
- Webinar Today: Scaling Software Supply Chain Security
- In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs
Latest News
- Bankrupt IronNet Shuts Down Operations
- AWS Using MadPot Decoy System to Disrupt APTs, Botnets
- Generative AI Startup Nexusflow Raises $10.6 Million
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- Researchers Extract Sounds From Still Images on Smartphone Cameras
- National Security Agency is Starting an Artificial Intelligence Security Center
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- Hackers Set Sights on Apache NiFi Flaw That Exposes Many Organizations to Attacks
