Resources and insights

The latest industry news, interviews, technologies, and resources.

ZTNA vs VPN: What's better for SMB Cybersecurity?

ZTNA vs VPN: What's better for SMB Cybersecurity?

Mollie Horne

14 minute read
Not a Flip of the Switch: How IT Managers Implement Zero Trust Models

Not a Flip of the Switch: How IT Managers Implement Zero Trust Models

Krista Lyons

13 minute read
Cybersecurity Awareness Training for Employees

Cybersecurity Awareness Training for Employees

Many employees have the best of intentions, but even the smallest mistakes can lead to big problems. That is why regular cybersecurity training for employees is so important. There are several key areas where you should focus your company’s training efforts. Here are the types of cybersecurity training for employees that should be conducted

OpenVPN Team

6 minute read
Watch on Demand: Strengthening Remote Access in Healthcare with Zero Trust 

Watch on Demand: Strengthening Remote Access in Healthcare with Zero Trust 

Krista Lyons

6 minute read
VPN Hardware Vs. VPN Software

VPN Hardware Vs. VPN Software

Basic research reveals that aVPNis essential to ensuring overall network security. Setting up a VPN gives you a secure tunnel online, and allows you to create point-to-point or site-to-site connections. It also allows you to securely connect routed or bridge configurations for remote access facilities, and you link your users through your

OpenVPN Team

5 minute read
Third Party Access Control

Third Party Access Control

Are you in control of your office building? Of your resources? Of your own network? Do you have the control to determine who — or what — has access to your resources? Access control, simply put, is all about controlling who gets access to what. It is one of the most fundamental security practices, and is crucial to protecting your organization.

OpenVPN Team

6 minute read
Technology Hijacking

Technology Hijacking

When you hear the word “hijacking” you probably think about aircraft. But hijacking is not exclusive to the aviation industry. It happens across a multitude of platforms — and occurs quite often in technology. Technology hijacking is when a cybercriminal takes control of devices and systems. Take a look at some of the top ways cybercriminals can

OpenVPN Team

4 minute read
Securing RDP for Remote Work

Securing RDP for Remote Work

If we have learned anything from the COVID-19 pandemic, it’s how essential it is to have reliable ways to keep working when going into the office isn’t an option. Most everyone has heard horror stories of companies that didn’t have remote work options in place before the virus, and then they were left scrambling when government officials mandated

OpenVPN Team

3 minute read
On Demand: Secure Remote Access for Hybrid and Remote Tech Workers

On Demand: Secure Remote Access for Hybrid and Remote Tech Workers

Krista Lyons

5 minute read
OpenVPN Partners with ZEDEDA to Connect and Secure Your Edge Network

OpenVPN Partners with ZEDEDA to Connect and Secure Your Edge Network

Krista Lyons

5 minute read
1 2 3 4 5