Resources and insights
The latest industry news, interviews, technologies, and resources.

Different Types of Insider Threats and How to Prevent Them
It doesn't take an expert to understand that cybersecurity threats have increased substantially over the years. Whether its DDoS attacks, ransomware, malware, or otherwise – all pose a significant risk to companies both large and small. It’s evident that businesses need to step up in the war on cybercrime before disaster strikes.
OpenVPN Team
3 minute read

How Cybersecurity has Changed in the Last Decade
The world was a different place in 2010: The global population had only just broached 7 billion (now up to 7.7), we still believed Lance Armstrong was clean, and Game of Thrones hadn’t even premiered on HBO. We looked at the world differently back then, because the lens of our lives were different. Now, ten years later, how have those lenses
OpenVPN Team
4 minute read

Defending Against the Most Common Wireless Network Attacks
Cybercrime has become a massive problem for businesses in recent years — organizations must take precautions before it’s too late. After all, some of the most well-known companies in the US have become subject to large-scale cyber attacks over the last decade, including the 2013 Target data breach in which hackers exposed a staggering 40 million
OpenVPN Team
3 minute read

SSL VPN Overview
Most long-distance communication these days happens over the internet. There are countless internet-based messaging apps, email providers, and other methods of communication — but that is only the tip of the iceberg regarding online communication. Any interaction on a website, network, or database is also a form of communication.
OpenVPN Team
4 minute read

OpenVPN 3 Linux and --auth-user-pass
With OpenVPN 3 Linux, as with most newer releases, the community has improved upon the security. One of the ways this is done is by increasing requirements around user credentials. This increased security has removed a feature used in OpenVPN 2.x clients where the username and password are provided via a credentials file. Due to this security
OpenVPN Team
5 minute read

4 Steps Towards Small Business Network Security
So you just started a business. You might even have a few team members, and you’re thrilled — you’re finally following your dream in a very real way. You know from your last job that you need to protect your data; you need a security plan of some kind. But how does a small business network security plan differ from the plan of a big corporation?
OpenVPN Team
3 minute read

What is SAML?
What is SAML? SAML, which stands for Security Assertion Markup Language, is an open standard for exchanging authentication and authorization data between an identity provider and a service provider.
OpenVPN Team
3 minute read

Meet the Author of Multiple OpenVPN Books
My name is Jan Just Keijser — otherwise known as JJK in OpenVPN circles. I am an IT professional with about 25 years of experience, and I've been using OpenVPN for nearly 16 years now. I currently work as a Software Engineer at Nikhef, a physics research lab in Amsterdam. I work on high performance and high throughput computing. I have also
OpenVPN Team
4 minute read

DIY MFA Setup | Community Edition
We’re going to use oathtool for our DIY setup on a FreeBSD host. These steps should be nearly identical on a Linux host, however. We need to create a file with our users and secrets. These secrets are the same secrets your users will import into their MFA application (OTP Auth, Google Authenticator, Okta Verify, etc.).
OpenVPN Team
3 minute read