Resources and insights

The latest industry news, interviews, technologies, and resources.

How to Secure Your Hybrid Workplace Technology

How to Secure Your Hybrid Workplace Technology

As most know, hybrid work has become a permanent fixture for many businesses. In fact, according to recent research from Gallup, as many as 55% of workers in the US have hybrid work arrangements. This flexibility presents the best of both worlds — employees can enjoy the flexibility of occasional remote work while employers can harness in-person

OpenVPN Team

8 minute read
Zero Trust and VPNs: NOT Mutually Exclusive

Zero Trust and VPNs: NOT Mutually Exclusive

Never trust, always verify. This is the basic premise behind a zero trust network. Zero trust can be an important piece of your layered cybersecurity, requiring strict identification to access a network. You don’t trust a connection without verifying it carefully. Many people in the tech industry have tried to paint the picture that zero trust

OpenVPN Team

7 minute read
Key Components of an Effective Cloud Security Framework

Key Components of an Effective Cloud Security Framework

Companies of all sizes hope to see benefits from implementing these robust frameworks, such as enhanced cloud visibility and control, reduced risks, and improved compliance. The expectation is that these frameworks will enable you to proactively identify and eliminate potential vulnerabilities, minimize data breach risks, and be in good standing

OpenVPN Team

8 minute read
Understanding Cloud Security Standards In 2025

Understanding Cloud Security Standards In 2025

Cloud security standards are necessary for small and mid-market-level companies to secure sensitive data, ensure regulatory compliance, and improve operational efficiency. The presence of cloud security standards helps businesses protect their data from cyber threats and maintain privacy. These standards are no longer a “nice-to-have” but a

OpenVPN Team

9 minute read
Understanding OpenVPN Access Server’s Two Free Connections

Understanding OpenVPN Access Server’s Two Free Connections

When you launch OpenVPN Access Server, you can connect immediately with two free connections. How does it work? Read on to understand how you can get started testing your setup before needing to purchase a license.

OpenVPN Team

3 minute read
Cybersecurity Awareness Training for Employees

Cybersecurity Awareness Training for Employees

Many employees have the best of intentions, but even the smallest mistakes can lead to big problems. That is why regular cybersecurity training for employees is so important. There are several key areas where you should focus your company’s training efforts. Here are the types of cybersecurity training for employees that should be conducted

OpenVPN Team

6 minute read
VPN Hardware Vs. VPN Software

VPN Hardware Vs. VPN Software

Basic research reveals that aVPNis essential to ensuring overall network security. Setting up a VPN gives you a secure tunnel online, and allows you to create point-to-point or site-to-site connections. It also allows you to securely connect routed or bridge configurations for remote access facilities, and you link your users through your

OpenVPN Team

5 minute read
Using Access Server With JumpCloud

Using Access Server With JumpCloud

Editor's Note: As of July 2022, Access Server now supports SAML natively.

OpenVPN Team

8 minute read
Third Party Access Control

Third Party Access Control

Are you in control of your office building? Of your resources? Of your own network? Do you have the control to determine who — or what — has access to your resources? Access control, simply put, is all about controlling who gets access to what. It is one of the most fundamental security practices, and is crucial to protecting your organization.

OpenVPN Team

6 minute read
Technology Hijacking

Technology Hijacking

When you hear the word “hijacking” you probably think about aircraft. But hijacking is not exclusive to the aviation industry. It happens across a multitude of platforms — and occurs quite often in technology. Technology hijacking is when a cybercriminal takes control of devices and systems. Take a look at some of the top ways cybercriminals can

OpenVPN Team

4 minute read