Resources and insights

The latest industry news, interviews, technologies, and resources.

What is a Cloud Network and How Does It Impact IT Teams?

What is a Cloud Network and How Does It Impact IT Teams?

A cloud network creates an option for corporate infrastructure that doesn’t require a physical server, nor a physical space, making it increasingly attractive for companies with a widely-distributed workforce. Cloud networking goes beyond simply hosting applications in the cloud — it can include security infrastructure that is built in the cloud.

Krista Lyons

10 minute read
April 2025 Cybersecurity Alert: SonicWall VPN Exploited & 16,000 Fortinet Devices Compromised

April 2025 Cybersecurity Alert: SonicWall VPN Exploited & 16,000 Fortinet Devices Compromised

The second week of April presented a host of challenges for both Fortinet and SonicWall VPN customers. With SonicWall facing major VPN exploits for the third month in 2025 and Fortinet facing continued issues, you may be wondering how to proceed.

Krista Lyons

6 minute read
OpenVPN Sweeps the Spring 2025 G2 Awards!

OpenVPN Sweeps the Spring 2025 G2 Awards!

OpenVPN is pleased to share another season of recognition based on reviews from real users of both Access Server and CloudConnexa through the highly-trusted G2 marketplace.

Krista Lyons

5 minute read
Your Guide to Implementing Multi-Factor Authentication: Cost and Strategies for Remote Workforce Security

Your Guide to Implementing Multi-Factor Authentication: Cost and Strategies for Remote Workforce Security

When you plan to implement multi-factor authentication (MFA), it’s about more than just giving your employees an extra step in their workday. It’s about adding barriers that bad actors can’t, or won’t, cross. This is especially important for hybrid or remote teams.

Krista Lyons

11 minute read
VPN Types and Their Protocols Explained: When to Use Them

VPN Types and Their Protocols Explained: When to Use Them

While working on your company’s security strategy, you likely have considered using a virtual private network, or VPN, for secure connections to your critical company assets (if not, we are still glad you’re here!). But knowing which protocol is right for your business might seem a bit more daunting than you originally realized — or perhaps you

Krista Lyons

9 minute read
Complimentary Gartner® Report: Emerging Tech: Universal ZTNA Drives Secure Access Consolidation

Complimentary Gartner® Report: Emerging Tech: Universal ZTNA Drives Secure Access Consolidation

By now, you likely have a ZTNA strategy. But what about universal ZTNA? Universal zero trust network access refers to the use of ZTNA for on-premises and remote users, with no distinction made as to the user’s location. Using the principle of least privilege, regardless of location, universal ZTNA allows secure remote access anywhere — and

Krista Lyons

4 minute read
Cloud Security Policy 101: Protect Your Data in the Cloud

Cloud Security Policy 101: Protect Your Data in the Cloud

Small and mid-market businesses (SMBs) have increasingly embraced the cloud for application usage, infrastructure management, and data storage. According to Techopedia, “By 2025, 30 percent of SMBs will shift half of their core workloads to the cloud to drive business agility and future resilience.” Such a meteoric rise in cloud adoption has

Krista Lyons

6 minute read
OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance

OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance

OpenVPN is proud to announce successful completion of two critical certifications: the System and Organization Controls (SOC) 2 Type 2 Certification examination, and HIPAA compliance. SOC 2 Type 2 certification was completed on November 26, 2024, and HIPAA compliance was completed on October 22, 2024.

Krista Lyons

3 minute read
January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase

January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase

Recent website and app bans in the U.S. and abroad have created a surge in personal VPN usage. However, that surge has also come with a rise in threat actors looking to exploit new personal VPN users.

Krista Lyons

6 minute read
How Identity and Access Management Fits Into Zero Trust

How Identity and Access Management Fits Into Zero Trust

If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive into everything you need to know about

Krista Lyons

11 minute read