Resources and insights

The latest industry news, interviews, technologies, and resources.

OpenVPN Partners with ZEDEDA to Connect and Secure Your Edge Network

OpenVPN Partners with ZEDEDA to Connect and Secure Your Edge Network

Krista Lyons

5 minute read
May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security 

May/June ‘24 Cybersecurity News Roundup: RAT Malware & Vulnerabilities Target Network Security 

Krista Lyons

5 minute read
Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage 

Summer Cybersecurity Roundup: Microsoft Vulnerabilities, CrowdStrike Outage 

Krista Lyons

7 minute read
The Heat is On: OpenVPN Wins Multiple G2 Awards

The Heat is On: OpenVPN Wins Multiple G2 Awards

Krista Lyons

5 minute read
CrowdStrike Update Causes Global Microsoft Outages: What You Need to Know

CrowdStrike Update Causes Global Microsoft Outages: What You Need to Know

Krista Lyons

3 minute read
April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

April ‘24 Cybersecurity News Roundup: Brute Force Attacks & Vulnerabilities on VPNs & SSH

Krista Lyons

8 minute read
2FA vs. MFA: What’s the Difference?

2FA vs. MFA: What’s the Difference?

More than 15 billion leaked credentials were available for sale online in 2024 — which means there is a solid chance that at least a few of your employees have information that has been compromised. Authentication plays a pivotal role in ensuring the security of sensitive data, systems, and networks, but only when it makes access more difficult

Krista Lyons

4 minute read
Secure Your Business: Access Control Policy Templates & Best Practices

Secure Your Business: Access Control Policy Templates & Best Practices

If you’re still in the startup stage, you may be tempted to allow open access for all resources to all employees. But as your team grows, your attack surface widens, making your business more appealing to bad actors. That’s where an access control policy template comes in.

Krista Lyons

13 minute read
How to Build a Zero Trust Architecture

How to Build a Zero Trust Architecture

Krista Lyons

11 minute read
Creative MFA Setup Messages to Boost Employee Adoption

Creative MFA Setup Messages to Boost Employee Adoption

Multi-factor authentication, MFA, is not new — but it does often get on your employees’ nerves. How many times have you heard someone complain about having to open Google Authenticator on their phone? Don’t even get us started on Microsoft authenticator complaints. But what if you could reframe MFA for your employees to make it less of a hassle?

Krista Lyons

6 minute read
1 2 3 4