OpenVPN Connect 3.3 for iOS Now Offers Profile-based Kill Switch

The latest release of OpenVPN Connect for iOS includes several great new features, including enhanced kill switch functionality. Keep reading to learn more.
September 7, 2022
Read More

OpenVPN Cloud Customer Success Story: Santa Cruz Nutritionals

Marc Edwards, a Senior Network Engineer with Santa Cruz Nutritionals, spoke with us to share his company's success using OpenVPN Cloud. He highlights its ease of use, scalability, and helpful integrations. Discover how OpenVPN Cloud might be the perfect solution for your business, too.
August 29, 2022
Read More

OpenVPN Now Offers a 5-Connection Plan

66% of small businesses report being concerned or extremely concerned about cybersecurity risk. Now you can give your startup or small business the secure network access you need and deserve at a price point you can afford. Get started with OpenVPN today!
August 16, 2022
Read More

OpenVPN Cloud Offers Low-Cost Secure Connectivity for Startups

OpenVPN Cloud is the easy, low-cost way to get a scalable, fully managed, cloud-based virtual networking platform for your startup or small business.
July 26, 2022
Read More

Now Available — Access Server 2.11.0 Update

OpenVPN Access Server now supports identity federation with SAML. You can now use a third-party IdP for SSO access to the administration and client portals.
July 21, 2022
Read More

Forget IT Security: Why OT Systems Could Be Your Biggest Cyber Risk

Operational Technology systems run the world. It’s time we address the expanded attack surface and security risks that come with them.
July 14, 2022
Read More

Why VPNs and Zero Trust Network Access Are Not Mutually Exclusive

Some voices within the IT and cybersecurity communities fail to recognize that secure remote access is absolutely achievable with a business VPN that also has a zero trust architecture in place. That's right: VPNs and ZTNA are not mutually exclusive.
July 7, 2022
Read More

Capital One Breach Shines Light on Cloud Security Risks, Human Error, and Insider Threats

On June 17, 2022, a former Amazon Web Services (AWS) employee was convicted of seven federal crimes related to her hacking of Capital One. This massive cloud data breach and crypto-mining incident stands out not just for the number of records breached but also the nature of the attack.
June 30, 2022
Read More

Cybersecurity for HIPAA Compliance

HIPAA affects healthcare providers everywhere. Here's what you need to know about cybersecurity compliance.
June 22, 2022
Read More

SOX Cybersecurity Compliance

The Sarbanes-Oxley Act (SOX) is a federal act passed in 2002 following financial scandals at Enron Corp., Tyco International, and WorldCom. Here's what you need to know.
June 16, 2022
Read More

What is LDAP?

In 1993, LDAP was introduced, allowing applications to access and authenticate specific user information across directory services. It also works on both public networks and private intranets. This user-friendly language is one of the easiest ways to access, modify, and authenticate information in virtually any directory.
June 7, 2022
Read More

3 Current Phishing Techniques That Put Your Business at Risk

Phishing is a perennial cyber risk for businesses and organizations of every size, in every industry. It’s a popular social engineering method designed to fool recipients into clicking malicious links, providing hackers access to their networks, or divulging Personally Identifiable Information (PII) or sensitive company data like credentials or financial information. Phishing attacks exploit the […]
June 2, 2022
Read More

Why Faster Ransomware Means Defenders Must Shift Left on the Cyber Kill Chain

We all know ransomware is among the top threats facing today’s organizations. The bad news is that the developers behind the malware they use are constantly innovating. In fact, some variants can encrypt 100,000 files in little as five minutes.
May 26, 2022
Read More

Beating BEC with People, Process and Technology

Business email compromise (BEC) is a typically dispassionate piece of cybersecurity terminology that actually signifies one of the biggest online threats facing organizations today.
May 19, 2022
Read More

The Lapsus$ Group: Who They Are and How to Protect Your Business

Staying one step ahead of cybercriminals takes extensive effort, especially when the targets seem to constantly be moving. There are new and persistent threats coming onto the scene all the time, some more alarming and chaotic than others.
May 17, 2022
Read More