Cloud Security (7)

Why Nation State Attacks Are Now A Problem For Everyone
In cybersecurity circles, there are a couple of well-worn beliefs about nation state threats. One holds that they are only relevant to a relatively small number of critical infrastructure, defense, and government organizations. The other is that such attackers are so replete with the latest tools, techniques, and resources that it’s pointless for
OpenVPN Team
5 minute read

Why Open Source Security Really Is More Secure
Facebook. Apple. Capital One. Marriot. Time after time, companies we trust experience data breaches — but it’s the individual customers who suffer. They’re the ones whose personal and even financial data is exposed to the world. It’s only natural, therefore, that in the face of such frequent and growing cyberattacks, people will question what type
OpenVPN Team
3 minute read

Get the Most Security Out of Your SaaS Tools
These days, almost every business uses SaaS tools on a regular basis. Accessible from any device with an internet connection and a web browser, ‘software-as-a-service’ tools are especially useful for businesses with remote teams. They scale well, which makes them excellent for startups who want to be able to keep the same tool through all stages
OpenVPN Team
3 minute read

Network Security: The Basics
Network security consists of preventing and protecting against unauthorized encroachment into corporate networks. Network security focuses on how devices interact rather than on the actual devices, like endpoint security. Network security and endpoint security go hand-in-hand.
OpenVPN Team
4 minute read

Coronavirus Scams Are Infecting Devices Around the Globe
As the threat of coronavirus increases, businesses are sending employees to work from home, and students are shifting to online classes. But with the social distancing comes a new threat – cyber attacks.
OpenVPN Team
7 minute read

SIM PIN
A few years ago, hackers found a bug that allowed them to access personal data on any T-Mobile customer. The bug was very well known in the criminal underground and there was even a tutorial on how to exploit it on YouTube. The bug exposed customers’ email addresses. Their billing account numbers, and the phone’s IMSI numbers (a
OpenVPN Team
4 minute read

KNOB Attack
Let’s talk about Bluetooth: “Bluetooth is a convenient and easy method of sharing data between devices, which, of course, qualifies it as a prime target for exploitation. A trio of researchers have discovered a vulnerability that has the potential of attacking billions of Bluetooth-enabled devices, including phones, laptops, IoT and IIoT
OpenVPN Team
3 minute read

Password Hygiene and the Disrupted Customer Experience
There’s no getting around the fact that most people see updating passwords as annoying and bothersome. So what happens when password updates and the online customer experience merge? In the most recent Cloud Security Tip, Steve Prentice posed an interesting question: “When companies in retail or enterprise remind their online visitors to change
OpenVPN Team
3 minute read

Long-Term Vulnerabilities
A lot of organizations have weaknesses that can be exploited — but what about those weaknesses that extend back for decades? It’s not comforting to think that trusted companies and products have had breachable weaknesses for years, but it is a reality that must be faced as more and more long-term vulnerabilities are brought to light. Some
OpenVPN Team
3 minute read

Network Visibility
Nearly 84% of businesses increased their cloud-based workloads in 2018, but lack of network visibility could compromise security and business value. Network visibility refers to how data is collected, aggregated, distributed, and served to monitoring and analytics tools — and study after study shows that cloud users want and need this visibility.
OpenVPN Team
4 minute read