Cloud Security (5)

Why Faster Ransomware Means Defenders Must Shift Left on the Cyber Kill Chain
We all know ransomware is among the top threats facing today’s organizations. Whether you’re a provider of critical national infrastructure or a regular SMB, there’s increasingly nowhere to hide. The advent of ransomware-as-a-service and the affiliate model has led to an explosion in the number of threat groups out there successfully monetizing
OpenVPN Team
5 minute read

Why Zero Trust Access Should Be On Every CISO's Roadmap
Secure Access Service Edge (SASE) – defined by Gartner – is a security framework prescribing the convergence of security and network connectivity technologies into a single cloud-delivered platform to enable secure and fast cloud transformation. With SASE, enterprises can secure their resources and simplify the accessibility that users require
OpenVPN Team
5 minute read

Top Retail Cybersecurity Challenges
E-commerce lets retailers use customer data and segmentation to deliver unique customer experiences. That’s why the industry eagerly pursued digital transformation. Unfortunately, that customer data also creates new vulnerabilities that weren’t part of traditional brick-and-mortar retail.
OpenVPN Team
6 minute read

Internet Gateway Selection Feature on CloudConnexa
You’ve deployed internet gateways. Now, you need a way to route the traffic — securely, from your networks, hosts, groups, and users with the flexibility to control where the exit takes place. This is all possible with Internet Gateway Selection, a new feature of CloudConnexa, that lets you configure how internet traffic is routed from your hosts,
OpenVPN Team
2 minute read

Types of DNS Attacks and How to Prevent Them
In the cybersecurity world, Distributed Denial of Service (DDoS), malware, and ransomware get more attention than domain name system (DNS) attacks, but DNS attacks are on the rise.
OpenVPN Team
9 minute read

Cybersecurity for Manufacturing Industry Regulatory Compliance
Mitigating Cyber Risk Vulnerabilities in the Industry 4.0 Age As the manufacturing industry segued from the first to second to third Industrial Revolutions, regulatory compliance came into being. As we embark on the fourth industrial revolution, also known as Industry 4.0, additional regulations are added. You’d be hard-pressed to find anyone who
OpenVPN Team
9 minute read

How to Fix IP Overlap with OpenVPN Cloud
Multi-cloud networking is the new reality for businesses — and issues that arise from overlapping IP addresses can hold companies back. Thankfully, a feature in CloudConnexa solves the problem by creating unique domain names that are used as routes to the different networks instead of the IP address subnets.
OpenVPN Team
4 minute read

SIM PIN
A few years ago, hackers found a bug that allowed them to access personal data on any T-Mobile customer. The bug was very well known in the criminal underground and there was even a tutorial on how to exploit it on YouTube. The bug exposed customers’ email addresses. Their billing account numbers, and the phone’s IMSI numbers (a
OpenVPN Team
4 minute read

KNOB Attack
Let’s talk about Bluetooth: “Bluetooth is a convenient and easy method of sharing data between devices, which, of course, qualifies it as a prime target for exploitation. A trio of researchers have discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices, including phones, laptops, IoT and IIoT
OpenVPN Team
3 minute read

Single-Tenant Vs. Multi-Tenant Cloud Services
There are two primary types of cloud services: The first is single-tenancy, which in cloud computing is often described as a single family home. The second is multi-tenancy, which is like an apartment building — but the key difference is that the walls that separate tenants from each other are not solid, but software. This form of cloud
OpenVPN Team
3 minute read