Resources and insights
The latest industry news, interviews, technologies, and resources.

Complimentary Gartner® Report: Emerging Tech: Universal ZTNA Drives Secure Access Consolidation
By now, you likely have a ZTNA strategy. But what about universal ZTNA? Universal zero trust network access refers to the use of ZTNA for on-premises and remote users, with no distinction made as to the user’s location. Using the principle of least privilege, regardless of location, universal ZTNA allows secure remote access anywhere — and
Krista Lyons
4 minute read

Cloud Security Policy 101: Protect Your Data in the Cloud
Small and mid-market businesses (SMBs) have increasingly embraced the cloud for application usage, infrastructure management, and data storage. According to Techopedia, “By 2025, 30 percent of SMBs will shift half of their core workloads to the cloud to drive business agility and future resilience.” Such a meteoric rise in cloud adoption has
Krista Lyons
6 minute read

How to Secure Your Hybrid Workplace Technology
As most know, hybrid work has become a permanent fixture for many businesses. In fact, according to recent research from Gallup, as many as 55% of workers in the US have hybrid work arrangements. This flexibility presents the best of both worlds — employees can enjoy the flexibility of occasional remote work while employers can harness in-person
OpenVPN Team
8 minute read

Zero Trust and VPNs: NOT Mutually Exclusive
Never trust, always verify. This is the basic premise behind a zero trust network. Zero trust can be an important piece of your layered cybersecurity, requiring strict identification to access a network. You don’t trust a connection without verifying it carefully. Many people in the tech industry have tried to paint the picture that zero trust
OpenVPN Team
7 minute read

Key Components of an Effective Cloud Security Framework
Companies of all sizes hope to see benefits from implementing these robust frameworks, such as enhanced cloud visibility and control, reduced risks, and improved compliance. The expectation is that these frameworks will enable you to proactively identify and eliminate potential vulnerabilities, minimize data breach risks, and be in good standing
OpenVPN Team
8 minute read

OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance
OpenVPN is proud to announce successful completion of two critical certifications: the System and Organization Controls (SOC) 2 Type 2 Certification examination, and HIPAA compliance. SOC 2 Type 2 certification was completed on November 26, 2024, and HIPAA compliance was completed on October 22, 2024.
Krista Lyons
3 minute read

January 2025 Cybersecurity Roundup: VPN Usage Surges & Threats Increase
Recent website and app bans in the U.S. and abroad have created a surge in personal VPN usage. However, that surge has also come with a rise in threat actors looking to exploit new personal VPN users.
Krista Lyons
6 minute read

How Identity and Access Management Fits Into Zero Trust
If you’ve heard anything about zero trust network access (ZTNA), you’ve likely heard the above phrase. Verifying identity is at the crux of zero trust, and identity and access management is how you make it happen. But isn’t it enough to use multi-factor authentication? Not exactly. In this post, we’ll dive into everything you need to know about
Krista Lyons
11 minute read

Understanding Cloud Security Standards In 2025
Cloud security standards are necessary for small and mid-market-level companies to secure sensitive data, ensure regulatory compliance, and improve operational efficiency. The presence of cloud security standards helps businesses protect their data from cyber threats and maintain privacy. These standards are no longer a “nice-to-have” but a
OpenVPN Team
9 minute read