Resources and insights

The latest industry news, interviews, technologies, and resources.

Key Components of an Effective Cloud Security Framework

Key Components of an Effective Cloud Security Framework

Companies of all sizes hope to see benefits from implementing these robust frameworks, such as enhanced cloud visibility and control, reduced risks, and improved compliance. The expectation is that these frameworks will enable you to proactively identify and eliminate potential vulnerabilities, minimize data breach risks, and be in good standing

OpenVPN Team

8 minute read
OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance

OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance

OpenVPN is proud to announce successful completion of two critical certifications: the System and Organization Controls (SOC) 2 Type 2 Certification examination, and HIPAA compliance. SOC 2 Type 2 certification was completed on November 26, 2024, and HIPAA compliance was completed on October 22, 2024.

Krista Lyons

3 minute read
January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase

January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase

Recent website and app bans in the U.S. and abroad have created a surge in personal VPN usage. However, that surge has also come with a rise in threat actors looking to exploit new personal VPN users.

Krista Lyons

6 minute read
How Identity and Access Management Fits Into Zero Trust

How Identity and Access Management Fits Into Zero Trust

If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive into everything you need to know about

Krista Lyons

11 minute read
Understanding Cloud Security Standards In 2025

Understanding Cloud Security Standards In 2025

Cloud security standards are necessary for small and mid-market-level companies to secure sensitive data, ensure regulatory compliance, and improve operational efficiency. The presence of cloud security standards helps businesses protect their data from cyber threats and maintain privacy. These standards are no longer a “nice-to-have” but a

OpenVPN Team

9 minute read
TikTok Ban: What It Means and Why a VPN Might Not Be Enough

TikTok Ban: What It Means and Why a VPN Might Not Be Enough

At OpenVPN, we understand that this situation has sparked renewed interest in VPNs as a potential solution, and we want to provide clarity and guidance. While a VPN can be a powerful tool for enhancing privacy and accessing restricted content, navigating a TikTok ban involves complexities beyond simply using a VPN. Here’s a breakdown of the

Heather Walters

3 minute read
OpenVPN Freezes Out the Competition with Winter 2025 G2 Awards

OpenVPN Freezes Out the Competition with Winter 2025 G2 Awards

OpenVPN has been consistently recognized by G2 in 2024 in the Business VPN category, and continues to enjoy recognition from the tech review giant to kick off 2025.

Krista Lyons

4 minute read
Understanding OpenVPN Access Server’s Two Free Connections

Understanding OpenVPN Access Server’s Two Free Connections

When you launch OpenVPN Access Server, you can connect immediately with two free connections. How does it work? Read on to understand how you can get started testing your setup before needing to purchase a license.

OpenVPN Team

3 minute read
Phishing Awareness Training: A Guide for IT Managers

Phishing Awareness Training: A Guide for IT Managers

Phishing is nothing new. In fact, phishing was one of the first social engineering attack methods on the internet, dating back as early as the 1990s via AOL email addresses. The problem with phishing awareness is that, while you might be familiar with the threats, reasons, and methods of attack, the employees in your organization may not be quite

Krista Lyons

9 minute read
ZTNA for Small and Mid-Size Businesses: Where to Begin

ZTNA for Small and Mid-Size Businesses: Where to Begin

What started as a nebulous new cybersecurity term defined by Forrester analyst John Kindervag in 2010 has morphed and changed through the years, but the intrigue has stayed the same with 61% of businesses claiming to have a zero trust strategy in 2024. As a result, product after product promises that if you give the right amount of money to the

Krista Lyons

6 minute read
1 2 3 4 5