VPN’s
Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start
ZTNA is a good fit for today’s remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy Sitting behind a desk in an office is quickly becoming a thing ...
8 Best Practices for Secure Remote Work Access
As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While... The post 8 Best Practices for Secure Remote Work Access appeared first ...
Sledgehammer VPN Approach Not Serving Apps, Users or IT
In the new work from home paradigm, zero trust and SASE should take the place of the traditional sledgehammer VPN approach The security world was already changing ahead of the global work ...
Increase in Small DDoS Attacks Could Take Down VPNs
Data breaches and ransomware might hog the headlines, but don’t forget to pay attention to DDoS attacks. According to research from Neustar, DDoS attacks increased by 168% in Q4 2019 compared to ...
Do VPNs Actually Protect Your Privacy?
With privacy a growing concern, it makes sense that an increasing number of people are turning to VPNs to protect themselves. VPNs are known for protecting users’ privacy by encrypting their computer ...
Are Free VPNs Safe?
An honest discussion about whether it’s safe to use free VPNs Let’s talk about free VPNs. Typically, when we get asked about whether or not it’s safe or wise to... The post ...
VPN Leaks: Knowing, Understanding and Preventing
VPNs have become much more popular as a way for people to keep their data secure in an increasingly insecure world. As the technology has grown in prevalence, a number of different ...
VPNs Aren’t Dead, They Just Need to Evolve
Companies have long relied on VPNs to secure corporate data and devices for remote workers, suppliers, contractors and other people authorized to access the company network. As technology continues to evolve, VPNs ...
SOCKS Proxy SDKs a New Risk for Enterprises
As an alternative to advertising, monetization SDKs are being used in apps in Google Play that utilize the phone as a SOCKS proxy. Appthority has already confirmed one major enterprise incident response ...

