Resources and insights
The latest industry news, interviews, technologies, and resources.

KNOB Attack
Let’s talk about Bluetooth: “Bluetooth is a convenient and easy method of sharing data between devices, which, of course, qualifies it as a prime target for exploitation. A trio of researchers have discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices, including phones, laptops, IoT and IIoT
OpenVPN Team
3 minute read

Disabling a Firewall
“Casey from accounting is getting frustrated, waiting for client files being held up by the firewall. Jordan is trying to join a video conference that needs a plugin, but the firewall won’t let it through. So they call the IT manager who then disables it.”
OpenVPN Team
3 minute read

OpenVPN Hackathon 2019
OpenVPN’s open source community wrapped up their annual hackathon on November 10th, in Trento, Italy. In attendance were ten software developers that are all members of the OpenVPN community. “The goal of the Hackathon is to get the open source guys together, and discuss current topics, and then execute on them.” Johan Draaisma, Product Manager at
OpenVPN Team
5 minute read

LastPass Vulnerability
Facebook's Mark Zuckerberg, Google's Sundar Pichai, Twitter's Jack Dorsey, Spotify’s Daniel Ek, Uber’s Travis Kalanick — the list could go on for CEOs whose Twitter accounts were hacked due to poor password hygiene. Interestingly enough, executive leadership of the world's leading tech giants are just as prone to password management issues as the
OpenVPN Team
3 minute read

Why Open Source Software is Good for Business
Many people still believe the myth that proprietary software, or software that is owned by an individual or a company, is more valuable than the alternative — open source software. However, there are almost always significant restrictions on proprietary software use, and its source code is almost always kept secret.
OpenVPN Team
3 minute read

Password Hygiene and the Disrupted Customer Experience
There’s no getting around the fact that most people see updating passwords as annoying and bothersome. So what happens when password updates and the online customer experience merge? In the most recent Cloud Security Tip, Steve Prentice posed an interesting question: “When companies in retail or enterprise remind their online visitors to change
OpenVPN Team
3 minute read

IoT Data
The Internet of Things (IoT) means everyday objects, such as smart plugs, lightbulbs, locks, coffee machines, and motion sensors can connect to the internet and creating a copious amount of data. This data can be used in ways we could not have imagined even a few years ago. A forecast from International Data Corporation (IDC) estimates
OpenVPN Team
4 minute read

Can You Score More Than 90% On Our Cybersecurity Quiz?
By the end of 2019, the estimated global cost of cybercrime will reach $2 trillion — and a single successful phishing attack can cost a small or medium-sized business a whopping $1.6 million. Clearly, neglecting your cybersecurity practices can affect your bottom line in a profound way. Don’t let your business be a part of those statistics — make
OpenVPN Team
1 minute read

The IoT Stampede
Autumn is officially here, which means stores are ramping up their sales. The back-to-school sales happened not too long ago, and next thing you know it will be Black Friday and Cyber Monday. As Steve Prentice explained in the latest Cloud Security Tip, “Every year, the fall season sees billions of dollars being spent on home-based IoT devices.”
OpenVPN Team
2 minute read

When to Hire a CISO
Organizations have been moving larger and larger quantities of corporate data to the cloud — because enterprises around the globe realize the benefits that the cloud has over traditional computing. However, the cloud presents different security challenges than that of conventional on-site and PC solutions. Security in the cloud should be addressed
OpenVPN Team
3 minute read