InfoSec

OpenVPN Announces SOC 2 Type 2 and HIPAA Compliance
OpenVPN is proud to announce successful completion of two critical certifications: the System and Organization Controls (SOC) 2 Type 2 Certification examination, and HIPAA compliance. SOC 2 Type 2 certification was completed on November 26, 2024, and HIPAA compliance was completed on October 22, 2024.
Krista Lyons
3 minute read

Navigating Cybersecurity: Choosing Between All-In-One Platforms and Point Solutions
The cybersecurity industry, and SaaS as a whole, is continually reshaping and changing through acquisitions. These deals have led to a boom in consolidated platforms offering multiple bundled solutions, and more companies attempting to satisfy multiple use cases through a diverse product portfolio.
Krista Lyons
11 minute read

Minimize Your Attack Surface with CloudConnexa® Device Identity Verification & Enforcement (DIVE)
Concerned about access control? Restrict the use of untrusted devices with CloudConnexa Device Identity Verification & Enforcement (DIVE). DIVE gives CloudConnexa administrators the power to leverage one of the key principles of Zero Trust Network Access (ZTNA) — Least Privilege — granting access to only the resources a user should have, from only
Mollie Horne
4 minute read

Three Ways to Integrate Device Posture Checks With Your VPN
In today's increasingly mobile and BYOD workforce, ensuring employees use secure devices when connecting to corporate networksis more critical than ever. Device posture information can help you identify and mitigate security risks in your business by ensuring that devices are updated with security patches, have antivirus software installed, and
OpenVPN Team
6 minute read

Anonymity, Privacy, and Security
Often, when I'm involved in discussions on various forums and discussion threads related to security and privacy on the Internet, I'm surprised how many people use the terms “anonymity,” “privacy,” and “security” interchangeably. These are actually three very different ideas, although they do have some overlapping aspects. Let's dive into the
OpenVPN Team
6 minute read

ZTNA — Beyond the Acronym
CloudConnexa delivers the most essential elements of Zero Trust Network Access (ZTNA). But why should that matter to you? Because we know that secure network connectivity matters to you, and you shouldn’t have to settle for a less-than-excellent solution.
OpenVPN Team
9 minute read

SOX Cybersecurity Compliance
Implementing Security Controls for Sarbanes-Oxley Compliance Requirements The Sarbanes-Oxley Act (SOX) is a federal act passed in 2002 following financial scandals at Enron Corp., Tyco International, and WorldCom. The fallout from these events led Congress to strengthen disclosure and auditing requirements for public companies to restore investor
OpenVPN Team
8 minute read

What is LDAP?
The Directory Access Protocol (DAP) is a protocol for accessing information in a directory service based on the X.500 recommendations. The Lightweight Directory Access Protocol (LDAP), as the name implies, is a lightweight, vendor-neutral version of DAP.
OpenVPN Team
6 minute read

3 Current Phishing Techniques That Put Your Business at Risk
Phishing is a perennial cyber risk for businesses and organizations of every size, in every industry. It’s a popular social engineering method designed to fool recipients into clicking malicious links, providing hackers access to their networks, or divulging Personally Identifiable Information (PII) or sensitive company data like credentials or
OpenVPN Team
5 minute read

Why Faster Ransomware Means Defenders Must Shift Left on the Cyber Kill Chain
We all know ransomware is among the top threats facing today’s organizations. Whether you’re a provider of critical national infrastructure or a regular SMB, there’s increasingly nowhere to hide. The advent of ransomware-as-a-service and the affiliate model has led to an explosion in the number of threat groups out there successfully monetizing
OpenVPN Team
5 minute read