Beating BEC with People, Process and Technology

Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today.
May 19, 2022
Read More

The Lapsus$ Group: Who They Are and How to Protect Your Business

Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to constantly be moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others.
May 17, 2022
Read More

Network Detection and Response Becomes More Essential as Nation State Attacks Escalate

On March 21, President Biden declared that US critical infrastructure is likely to soon come under concerted attack from the Kremlin. In fact, these warnings have been coming for several weeks now — ever since Russia invaded Ukraine. The surprise in cyber and national security circles is that such attacks have yet to materialize. Russian […]
May 12, 2022
Read More

How To Close the IoT Security Gaps In Your ICS Networks

Today’s industrial control system (ICS) networks are much more advanced than networks of the past. In addition to IT systems, IoT devices like cameras, tablets, asset management sensors, and environmental monitoring devices are deployed to streamline workflows and enhance data-driven decisions.  IoT devices make up 30% of all connected endpoints. While these sensors, apps, and […]
May 10, 2022
Read More

Are You Leaving Third Party Risk Management to Guesswork?

Third party risk management is never something that should be neglected or left to guesswork.
May 5, 2022
Read More

Cybersecurity for Manufacturing Industry Regulatory Compliance

As manufacturing evolves, so do compliance requirements. That's why Data Protection is now one of the main areas of manufacturing compliance.
May 3, 2022
Read More

PCI DSS Compliance for Retail and OpenVPN Cloud

Cashless e-commerce purchases were already on the rise before COVID-19. Once the pandemic hit even brick-and-mortar retail outlets moved away from cash transactions, and most don't appear to be reversing that trend.
April 28, 2022
Read More

Why Zero Trust Access Should Be On Every CISO's Roadmap

CISOs building a roadmap for SASE should not overlook the importance of creating a zero trust network. Not creating a zero trust network is a mistake that many CISO’s make, and also one that comes at a cost.
April 26, 2022
Read More

Emerging Technologies To Watch for Business Transformation

The link between technology adoption and business success has a long history of powerful impact. Failure to innovate ways to leverage technology will create gaps — and put you at a competitive disadvantage.
April 21, 2022
Read More

How OpenVPN Cloud Enables Zero Trust for Small Businesses

Owning and operating a small business is a labor of love, and often requires running as lean as possible. Can SMBs afford robust, reliable security solutions that reduce security risks and put them on the path to zero trust?
April 19, 2022
Read More

OpenVPN's Robert Weiss Speaks at ShmooCon

OpenVPN's own Head of Information Security, Robert Weiss, spoke recently at ShmooCon.
April 14, 2022
Read More

Cybersecurity For Tech Companies

With tech playing such a large role in critical infrastructure, national security, and healthcare, as well as the private sector, mitigating cyberattacks pre-empting vulnerabilities will continue to be a challenge.
April 12, 2022
Read More

Top Retail Cybersecurity Challenges

E-commerce lets retailers use customer data and segmentation to deliver unique customer experiences. That’s why the industry eagerly pursued digital transformation. Unfortunately, that customer data also creates new vulnerabilities that weren’t part of traditional brick-and-mortar retail.
April 7, 2022
Read More

How to Prevent Scareware Attacks with OpenVPN Cloud

Does anybody like pop-ups? Unlikely. That's why pop-up blockers are so popular. And as if pop-up ads and pop-up windows weren’t annoying enough, now scammers are using scareware pop-ups to trick users more determinedly than ever.
April 5, 2022
Read More

Cloud-Based Cybersecurity for Financial Services

Financial Services organizations need the ability to evolve their IT security to stay ahead of threats. One way to do this is by building threat intelligence.
March 31, 2022
Read More