No Result
View All Result
SUBMIT YOUR ARTICLES
  • Login
Sunday, April 26, 2026
TheAdviserMagazine.com
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal
No Result
View All Result
TheAdviserMagazine.com
No Result
View All Result
Home Market Research Market Analysis

Is Zero Trust Canceled? Revisiting DEF CON Research

by TheAdviserMagazine
8 months ago
in Market Analysis
Reading Time: 4 mins read
A A
Is Zero Trust Canceled? Revisiting DEF CON Research
Share on FacebookShare on TwitterShare on LInkedIn


Cybersecurity presentations are known for having pithy titles (usually, the more provocative, the better). And nobody will lose any points for dunking on a concept or term with as much saturation — and overuse in marketing — as Zero Trust. On that score, AmberWolf’s talk at DEF CON 33, titled “Zero Trust, Total Bust: Breaking Into Thousands Of Cloud-Based VPNs With One Bug,” ticks all the boxes. But what about the substance of the critique? Did the research uncover fundamental flaws in Zero Trust? Although we think the research uncovered some significant issues, calling it a “total bust” is definitely overblown.

AmberWolf Identified Significant Flaws In Multiple Products

Over the course of seven months, AmberWolf researchers examined Zero Trust network access (ZTNA) products from security vendors Check Point, Netskope, and Zscaler, finding multiple security issues — more specifically, identity and access management (IAM) problems: user impersonation, authentication bypass, local privilege escalation, and access to an SFTP server containing client logs and authentication material. In short, they found the same sorts of vulnerabilities that routinely appear in other software.

The issue with security flaws in Zero Trust platforms themselves is that these platforms serve as foundational infrastructure and guardians responsible for access policy (authentication and authorization) enforcement to a wide variety and large number of enterprise resources instead of just one. These issues also highlight lingering implicit trust. We’ve made great strides in verifying users and endpoints, but we still rely on other systems to 1) implement and enforce policies reliably and 2) be trustworthy by virtue of being (mostly) free of critical, exploitable defects. The AmberWolf research demonstrates a breakdown in both.

Zero Trust Isn’t A Product

It bears repeating that Zero Trust isn’t a single thing (and it’s most definitely not a product). Zero Trust is a combination of things such as strong authentication (of users, devices, and apps/workloads), enforcement of least privilege, segmentation, data classification, and more.

Each of the Zero Trust domains is intended to work on its own and in concert with the others to ensure that a failure in one control doesn’t result in a catastrophic breach. The metaphorical purpose of the architecture, in other words, is to prevent fire or — barring that — contain its spread and limit the resulting damage. Depending on any one element to achieve that goal is a textbook example of a single point of failure and antithetical to the philosophy and goals of Zero Trust.

Product Security Problems Don’t Invalidate Architecture

The ZTNA products that AmberWolf examined are unfortunately not the first security products to have security flaws. It’s quite a leap, however, to say that flaws in security products mean that an underlying security architecture principle is flawed.

If building materials like cement and steel are defective, we don’t say that the design principles behind building a skyscraper are junk. Instead, we look at the root cause of the flaws in those materials and figure out how to avoid them in the future. If it’s a pervasive issue, it may mean a new approach to making and testing those materials; if it’s a couple of suppliers cutting corners, it may mean purchasing materials somewhere else next time.

One important way for vendors to ensure the security of their products is using and consistently upgrading robust, well-tested, standards-based packages such as OpenSSL, OpenSSH, OpenAM, and more. An important corollary to “don’t roll your own crypto” should be “don’t roll your own IAM libraries” to avoid precisely the issues identified by AmberWolf’s testing.

Like any software or hardware vendor, security vendors must incorporate product security principles throughout the product lifecycle to protect their customers and their brand. This starts early in the lifecycle, where security must identify strategic risks and potential threats, and continues with activities such as threat modeling, security training, pre-release application security testing, and post-deployment protections.

Critically, product security teams must also help product teams build in security and IAM features (like authentication), recommend secure default configurations, and make deployment and configuration guidance available to systems integrators that work with their customers. Through it all, close coordination with the product team is key.

It’s not unreasonable to hold security vendors to a higher standard when it comes to product security. CISA launched the Secure by Design pledge, with hundreds of enterprise software companies signing on and committing to building security into their products. If a vendor that you work with (security or otherwise) hasn’t signed the pledge, ask why not. If they have, ask them to share their progress against the goals.

Is Cloud Delivery Better, Worse, Or Just … Different?

A large and growing number of security capabilities are delivered at least partially via the cloud. That could be seen as a liability in this context. Despite the attention-grabbing claim about breaking into thousands of VPNs using a single bug, AmberWolf did no such thing — although its research clearly shows that an attack on that scale would have been possible. We say “would have been” because, although cloud delivery can sometimes result in new attack vectors, the cloud also offers benefits in terms of vulnerability remediation.

Zscaler responded to and fixed the vulnerability reported by AmberWolf the same day (although there was a brief regression several days later that was also quickly repaired). As with any case of security issues in security products, responsiveness and transparency matter. Contrast this with severe, exploited vulnerabilities in on-premises infrastructure that required federal law enforcement intervention or guidance that involved literally unplugging affected systems to remediate security issues — not to mention coordinated action on the part of hundreds or thousands of organizations, as opposed to just one.

Connect With Us

As always, Forrester clients can connect with Sandy for product security, Andras for identity, and me for Zero Trust by setting up a guidance session or inquiry.

We’ll also be in Austin, Texas, on November 5–7 with a host of our colleagues for the Forrester Security & Risk Summit. This year’s theme is “Master Risk, Conquer Chaos,” and the agenda includes a track focused on Zero Trust as well as a variety of keynotes, breakouts, workshops, roundtables, and special programs to help you master whatever chaos your teams are facing today. We hope to see you there!



Source link

Tags: canceledconDEFResearchRevisitingTrust
ShareTweetShare
Previous Post

Take This Quiz to Test If Your Retirement Knowledge Is Better Than Average

Next Post

10 Highest Yielding Kevin O’Leary Stocks Now

Related Posts

edit post
Software for Managing Channel Rebates: The 2026 Executive Guide to Automated Incentives

Software for Managing Channel Rebates: The 2026 Executive Guide to Automated Incentives

by TheAdviserMagazine
April 25, 2026
0

A typical manufacturer loses up to 10% of their total incentive budget every year to “leakage” caused by manual processing...

edit post
How to Automate Partner Rebate Programs: The 2026 Strategy Guide

How to Automate Partner Rebate Programs: The 2026 Strategy Guide

by TheAdviserMagazine
April 24, 2026
0

According to a 2023 report by the Incentive Research Foundation, manual incentive management results in a 10% error rate in...

edit post
Lessons From IT Security: How Revenue Enablement Builds Executive Relevance

Lessons From IT Security: How Revenue Enablement Builds Executive Relevance

by TheAdviserMagazine
April 24, 2026
0

We recently published Advocating For Revenue Enablement: A Practitioner’s Guide To Executive Communications, a report born from a familiar frustration: Revenue...

edit post
What Will Decide the Future of Tokenized Finance?

What Will Decide the Future of Tokenized Finance?

by TheAdviserMagazine
April 24, 2026
0

Tokenization is shaping into a foundation for the next wave of financial system development. Experts and analysts discussed it at...

edit post
In The AI Era, Banks Need Dynamic Platforms — Results From The Forrester Wave™: Digital Banking Engagement Platforms, Q2 2026

In The AI Era, Banks Need Dynamic Platforms — Results From The Forrester Wave™: Digital Banking Engagement Platforms, Q2 2026

by TheAdviserMagazine
April 24, 2026
0

To compete for customers and grow profitably, banks need the ability to adjust as much and as fast as required...

edit post
Digital Natives Are Rewriting B2B Buying

Digital Natives Are Rewriting B2B Buying

by TheAdviserMagazine
April 24, 2026
0

Today’s B2B buying groups are bigger, more networked, and increasingly led by digital natives. In Forrester’s Buyers’ Journey Survey, 2025, 64%...

Next Post
edit post
10 Highest Yielding Kevin O’Leary Stocks Now

10 Highest Yielding Kevin O'Leary Stocks Now

edit post
Updated for 2025: The ultimate couch potato portfolio guide

Updated for 2025: The ultimate couch potato portfolio guide

  • Trending
  • Comments
  • Latest
edit post
Illinois’ Paid Leave for All Workers Act Takes Effect — Every Employee Now Gets Guaranteed Time Off

Illinois’ Paid Leave for All Workers Act Takes Effect — Every Employee Now Gets Guaranteed Time Off

March 27, 2026
edit post
Virginia Permits ADULT MIGRANT MEN To Attend High School

Virginia Permits ADULT MIGRANT MEN To Attend High School

March 30, 2026
edit post
A 58-year-old left NYC for Miami to save on taxes — then retired early thanks to hidden savings. Here’s the math

A 58-year-old left NYC for Miami to save on taxes — then retired early thanks to hidden savings. Here’s the math

March 30, 2026
edit post
Tax Flight Accelerates In Massachusetts

Tax Flight Accelerates In Massachusetts

April 6, 2026
edit post
Property Tax Relief & Income Tax Relief

Property Tax Relief & Income Tax Relief

April 1, 2026
edit post
The Stevia Loophole Why Some Sweetened Drinks are Still SNAP-Legal While Others are Banned in Texas

The Stevia Loophole Why Some Sweetened Drinks are Still SNAP-Legal While Others are Banned in Texas

April 4, 2026
edit post
Wells Fargo Raises its Price Target on Evergy (EVRG) to

Wells Fargo Raises its Price Target on Evergy (EVRG) to $87

0
edit post
As Inflation Reignites, Should You Consider I Bonds?

As Inflation Reignites, Should You Consider I Bonds?

0
edit post
Can the IRS Ignore Your Request for an Estate Tax Valuation Explanation? – Houston Tax Attorneys

Can the IRS Ignore Your Request for an Estate Tax Valuation Explanation? – Houston Tax Attorneys

0
edit post
Stock Market Holiday: NSE, BSE to remain shut one day this week. Check upcoming market holidays

Stock Market Holiday: NSE, BSE to remain shut one day this week. Check upcoming market holidays

0
edit post
“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

0
edit post
John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

0
edit post
“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

“Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious

April 26, 2026
edit post
Week 17: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

Week 17: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!

April 26, 2026
edit post
John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches

April 26, 2026
edit post
Stablecoin Market Sheds 2M as KelpDAO Breach Triggers DeFi Unwind

Stablecoin Market Sheds $892M as KelpDAO Breach Triggers DeFi Unwind

April 26, 2026
edit post
Gilead Sciences Inc. (GILD): Growing Popularity as Defensive Stock

Gilead Sciences Inc. (GILD): Growing Popularity as Defensive Stock

April 26, 2026
edit post
As Inflation Reignites, Should You Consider I Bonds?

As Inflation Reignites, Should You Consider I Bonds?

April 26, 2026
The Adviser Magazine

The first and only national digital and print magazine that connects individuals, families, and businesses to Fee-Only financial advisers, accountants, attorneys and college guidance counselors.

CATEGORIES

  • 401k Plans
  • Business
  • College
  • Cryptocurrency
  • Economy
  • Estate Plans
  • Financial Planning
  • Investing
  • IRS & Taxes
  • Legal
  • Market Analysis
  • Markets
  • Medicare
  • Money
  • Personal Finance
  • Social Security
  • Startups
  • Stock Market
  • Trading

LATEST UPDATES

  • “Men Over 50: The ‘Silent AFib’ Risk Doctors Say You May Not Feel Until It’s Serious
  • Week 17: A Peek Into This Past Week + What I’m Reading, Listening to, and Watching!
  • John Ternus, Apple’s new CEO, inherits a rebounding China business—and some messy headaches
  • Our Great Privacy Policy
  • Terms of Use, Legal Notices & Disclosures
  • Contact us
  • About Us

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Financial Planning
    • Financial Planning
    • Personal Finance
  • Market Research
    • Business
    • Investing
    • Money
    • Economy
    • Markets
    • Stocks
    • Trading
  • 401k Plans
  • College
  • IRS & Taxes
  • Estate Plans
  • Social Security
  • Medicare
  • Legal

© Copyright 2024 All Rights Reserved
See articles for original source and related links to external sites.