Resources and insights

The latest industry news, interviews, technologies, and resources.

Different Types of Insider Threats and How to Prevent Them

Different Types of Insider Threats and How to Prevent Them

It doesn't take an expert to understand that cybersecurity threats have increased substantially over the years. Whether its DDoS attacks, ransomware, malware, or otherwise – all pose a significant risk to companies both large and small. It’s evident that businesses need to step up in the war on cybercrime before disaster strikes.

OpenVPN Team

3 minute read
How Cybersecurity has Changed in the Last Decade

How Cybersecurity has Changed in the Last Decade

The world was a different place in 2010: The global population had only just broached 7 billion (now up to 7.7), we still believed Lance Armstrong was clean, and Game of Thrones hadn’t even premiered on HBO. We looked at the world differently back then, because the lens of our lives were different. Now, ten years later, how have those lenses

OpenVPN Team

4 minute read
Defending Against the Most Common Wireless Network Attacks

Defending Against the Most Common Wireless Network Attacks

Cybercrime has become a massive problem for businesses in recent years — organizations must take precautions before it’s too late. After all, some of the most well-known companies in the US have become subject to large-scale cyber attacks over the last decade, including the 2013 Target data breach in which hackers exposed a staggering 40 million

OpenVPN Team

3 minute read
SSL VPN Overview

SSL VPN Overview

Most long-distance communication these days happens over the internet. There are countless internet-based messaging apps, email providers, and other methods of communication — but that is only the tip of the iceberg regarding online communication. Any interaction on a website, network, or database is also a form of communication.

OpenVPN Team

4 minute read
OpenVPN 3 Linux and --auth-user-pass

OpenVPN 3 Linux and --auth-user-pass

With OpenVPN 3 Linux, as with most newer releases, the community has improved upon the security. One of the ways this is done is by increasing requirements around user credentials. This increased security has removed a feature used in OpenVPN 2.x clients where the username and password are provided via a credentials file. Due to this security

OpenVPN Team

5 minute read
4 Steps Towards Small Business Network Security

4 Steps Towards Small Business Network Security

So you just started a business. You might even have a few team members, and you’re thrilled — you’re finally following your dream in a very real way. You know from your last job that you need to protect your data; you need a security plan of some kind. But how does a small business network security plan differ from the plan of a big corporation?

OpenVPN Team

3 minute read
What is SAML?

What is SAML?

What is SAML? SAML, which stands for Security Assertion Markup Language, is an open standard for exchanging authentication and authorization data between an identity provider and a service provider.

OpenVPN Team

3 minute read
Meet the Author of Multiple OpenVPN Books

Meet the Author of Multiple OpenVPN Books

My name is Jan Just Keijser — otherwise known as JJK in OpenVPN circles. I am an IT professional with about 25 years of experience, and I've been using OpenVPN for nearly 16 years now. I currently work as a Software Engineer at Nikhef, a physics research lab in Amsterdam. I work on high performance and high throughput computing. I have also

OpenVPN Team

4 minute read
DIY MFA Setup | Community Edition

DIY MFA Setup | Community Edition

We’re going to use oathtool for our DIY setup on a FreeBSD host. These steps should be nearly identical on a Linux host, however. We need to create a file with our users and secrets. These secrets are the same secrets your users will import into their MFA application (OTP Auth, Google Authenticator, Okta Verify, etc.).

OpenVPN Team

3 minute read
OpenVPN MFA Setup | Community Edition

OpenVPN MFA Setup | Community Edition

For this demonstration, the important parts are going to be the MFA challenge response mechanisms.

OpenVPN Team

4 minute read