Cloud Security (5)

Internet Gateway Selection Feature on CloudConnexa
You’ve deployed internet gateways. Now, you need a way to route the traffic — securely, from your networks, hosts, groups, and users with the flexibility to control where the exit takes place. This is all possible with Internet Gateway Selection, a new feature of CloudConnexa, that lets you configure how internet traffic is routed from your hosts,
OpenVPN Team
2 minute read

Types of DNS Attacks and How to Prevent Them
In the cybersecurity world, Distributed Denial of Service (DDoS), malware, and ransomware get more attention than domain name system (DNS) attacks, but DNS attacks are on the rise.
OpenVPN Team
9 minute read

Cybersecurity for Manufacturing Industry Regulatory Compliance
Mitigating Cyber Risk Vulnerabilities in the Industry 4.0 Age As the manufacturing industry segued from the first to second to third Industrial Revolutions, regulatory compliance came into being. As we embark on the fourth industrial revolution, also known as Industry 4.0, additional regulations are added. You’d be hard-pressed to find anyone who
OpenVPN Team
9 minute read

How to Fix IP Overlap with OpenVPN Cloud
Multi-cloud networking is the new reality for businesses — and issues that arise from overlapping IP addresses can hold companies back. Thankfully, a feature in CloudConnexa solves the problem by creating unique domain names that are used as routes to the different networks instead of the IP address subnets.
OpenVPN Team
4 minute read

SIM PIN
A few years ago, hackers found a bug that allowed them to access personal data on any T-Mobile customer. The bug was very well known in the criminal underground and there was even a tutorial on how to exploit it on YouTube. The bug exposed customers’ email addresses. Their billing account numbers, and the phone’s IMSI numbers (a
OpenVPN Team
4 minute read

KNOB Attack
Let’s talk about Bluetooth: “Bluetooth is a convenient and easy method of sharing data between devices, which, of course, qualifies it as a prime target for exploitation. A trio of researchers have discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices, including phones, laptops, IoT and IIoT
OpenVPN Team
3 minute read

Single-Tenant Vs. Multi-Tenant Cloud Services
There are two primary types of cloud services: The first is single-tenancy, which in cloud computing is often described as a single family home. The second is multi-tenancy, which is like an apartment building — but the key difference is that the walls that separate tenants from each other are not solid, but software. This form of cloud
OpenVPN Team
3 minute read

Advantages and Disadvantages of API for Business
API's are essential tools for businesses — they streamline organizational operations, and provide strategic value such as additional exposure for your brand and increased revenue. APIs are a new type of ecosystem, allowing companies to expand into new markets where they can use them for more than just technical concepts.
OpenVPN Team
5 minute read

Advantages of using Google Cloud Identity for authentication of both SaaS applications and VPN access
Use of a Virtual Private Network (VPN) is a great security tool to extend your private network to remote users and locations while at the same time ensuring that only authorized users can access the private network. However, even the best security safeguards will come to naught if the user identities used to authenticate VPN access are not
OpenVPN Team
6 minute read