Resources and insights
The latest industry news, interviews, technologies, and resources.

Cloud Security Policy 101: Protect Your Data in the Cloud
Small and mid-market businesses (SMBs) have increasingly embraced the cloud for application usage, infrastructure management, and data storage. According to Techopedia, “By 2025, 30 percent of SMBs will shift half of their core workloads to the cloud to drive business agility and future resilience.” Such a meteoric rise in cloud adoption has
Krista Lyons
6 minute read

OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance
OpenVPN is proud to announce successful completion of two critical certifications: the System and Organization Controls (SOC) 2 Type 2 Certification examination, and HIPAA compliance. SOC 2 Type 2 certification was completed on November 26, 2024, and HIPAA compliance was completed on October 22, 2024.
Krista Lyons
3 minute read

January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase
Recent website and app bans in the U.S. and abroad have created a surge in personal VPN usage. However, that surge has also come with a rise in threat actors looking to exploit new personal VPN users.
Krista Lyons
6 minute read

How Identity and Access Management Fits Into Zero Trust
If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive into everything you need to know about
Krista Lyons
11 minute read

OpenVPN Freezes Out the Competition with Winter 2025 G2 Awards
OpenVPN has been consistently recognized by G2 in 2024 in the Business VPN category, and continues to enjoy recognition from the tech review giant to kick off 2025.
Krista Lyons
4 minute read

Phishing Awareness Training: A Guide for IT Managers
Phishing is nothing new. In fact, phishing was one of the first social engineering attack methods on the internet, dating back as early as the 1990s via AOL email addresses. The problem with phishing awareness is that, while you might be familiar with the threats, reasons, and methods of attack, the employees in your organization may not be quite
Krista Lyons
9 minute read

ZTNA for Small and Mid-Size Businesses: Where to Begin
What started as a nebulous new cybersecurity term defined by Forrester analyst John Kindervag in 2010 has morphed and changed through the years, but the intrigue has stayed the same with 61% of businesses claiming to have a zero trust strategy in 2024. As a result, product after product promises that if you give the right amount of money to the
Krista Lyons
6 minute read