InfoSec

Navigating Cybersecurity: Choosing Between All-In-One Platforms and Point Solutions

Navigating Cybersecurity: Choosing Between All-In-One Platforms and Point Solutions

The cybersecurity industry, and SaaS as a whole, is continually reshaping and changing through acquisitions. These deals have led to a boom in consolidated platforms offering multiple bundled solutions, and more companies attempting to satisfy multiple use cases through a diverse product portfolio.

Krista Lyons

11 minute read
Minimize Your Attack Surface with CloudConnexa® Device Identity Verification & Enforcement (DIVE)

Minimize Your Attack Surface with CloudConnexa® Device Identity Verification & Enforcement (DIVE)

Concerned about access control? Restrict the use of untrusted devices with CloudConnexa Device Identity Verification & Enforcement (DIVE). DIVE gives CloudConnexa administrators the power to leverage one of the key principles of Zero Trust Network Access (ZTNA) — Least Privilege — granting access to only the resources a user should have, from only

Mollie Horne

4 minute read
Three Ways to Integrate Device Posture Checks With Your VPN

Three Ways to Integrate Device Posture Checks With Your VPN

In today's increasingly mobile and BYOD workforce, ensuring employees use secure devices when connecting to corporate networksis more critical than ever. Device posture information can help you identify and mitigate security risks in your business by ensuring that devices are updated with security patches, have antivirus software installed, and

OpenVPN Team

6 minute read
Anonymity, Privacy, and Security

Anonymity, Privacy, and Security

Often, when I'm involved in discussions on various forums and discussion threads related to security and privacy on the Internet, I'm surprised how many people use the terms “anonymity,” “privacy,” and “security” interchangeably. These are actually three very different ideas, although they do have some overlapping aspects. Let's dive into the

OpenVPN Team

6 minute read
ZTNA — Beyond the Acronym

ZTNA — Beyond the Acronym

CloudConnexa delivers the most essential elements of Zero Trust Network Access (ZTNA). But why should that matter to you? Because we know that secure network connectivity matters to you, and you shouldn’t have to settle for a less-than-excellent solution.

OpenVPN Team

9 minute read
SOX Cybersecurity Compliance

SOX Cybersecurity Compliance

Implementing Security Controls for Sarbanes-Oxley Compliance Requirements The Sarbanes-Oxley Act (SOX) is a federal act passed in 2002 following financial scandals at Enron Corp., Tyco International, and WorldCom. The fallout from these events led Congress to strengthen disclosure and auditing requirements for public companies to restore investor

OpenVPN Team

8 minute read
What is LDAP?

What is LDAP?

The Directory Access Protocol (DAP) is a protocol for accessing information in a directory service based on the X.500 recommendations. The Lightweight Directory Access Protocol (LDAP), as the name implies, is a lightweight, vendor-neutral version of DAP.

OpenVPN Team

6 minute read
3 Current Phishing Techniques That Put Your Business at Risk

3 Current Phishing Techniques That Put Your Business at Risk

Phishing is a perennial cyber risk for businesses and organizations of every size, in every industry. It’s a popular social engineering method designed to fool recipients into clicking malicious links, providing hackers access to their networks, or divulging Personally Identifiable Information (PII) or sensitive company data like credentials or

OpenVPN Team

5 minute read
Why Faster Ransomware Means Defenders Must Shift Left on the Cyber Kill Chain

Why Faster Ransomware Means Defenders Must Shift Left on the Cyber Kill Chain

We all know ransomware is among the top threats facing today’s organizations. Whether you’re a provider of critical national infrastructure or a regular SMB, there’s increasingly nowhere to hide. The advent of ransomware-as-a-service and the affiliate model has led to an explosion in the number of threat groups out there successfully monetizing

OpenVPN Team

5 minute read
Beating BEC with People, Process and Technology

Beating BEC with People, Process and Technology

Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today. In fact, threat actors made more money from BEC scams last year than any other type of cybercrime, according to an annual FBI report published recently. The bad news

OpenVPN Team

4 minute read