ZTNA

Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start

ZTNA is a good fit for today’s remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy Sitting behind a desk in an office is quickly becoming a thing ...
Security Boulevard
8 Best Practices for Secure Remote Work Access

8 Best Practices for Secure Remote Work Access

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While... The post 8 Best Practices for Secure Remote Work Access appeared first ...
sledgehammer VPN

Sledgehammer VPN Approach Not Serving Apps, Users or IT

In the new work from home paradigm, zero trust and SASE should take the place of the traditional sledgehammer VPN approach The security world was already changing ahead of the global work ...
Security Boulevard
DDoS attacks

Increase in Small DDoS Attacks Could Take Down VPNs

Data breaches and ransomware might hog the headlines, but don’t forget to pay attention to DDoS attacks. According to research from Neustar, DDoS attacks increased by 168% in Q4 2019 compared to ...
Security Boulevard

Do VPNs Actually Protect Your Privacy?

With privacy a growing concern, it makes sense that an increasing number of people are turning to VPNs to protect themselves. VPNs are known for protecting users’ privacy by encrypting their computer ...
Not Great, Bob!

Are Free VPNs Safe?

An honest discussion about whether it’s safe to use free VPNs Let’s talk about free VPNs. Typically, when we get asked about whether or not it’s safe or wise to... The post ...
security testing

VPN Leaks: Knowing, Understanding and Preventing

VPNs have become much more popular as a way for people to keep their data secure in an increasingly insecure world. As the technology has grown in prevalence, a number of different ...
Security Boulevard
VPNs Aren’t Dead

VPNs Aren’t Dead, They Just Need to Evolve

Companies have long relied on VPNs to secure corporate data and devices for remote workers, suppliers, contractors and other people authorized to access the company network. As technology continues to evolve, VPNs ...
Security Boulevard
SOCKS Proxy SDKs a New Risk for Enterprises

SOCKS Proxy SDKs a New Risk for Enterprises

As an alternative to advertising, monetization SDKs are being used in apps in Google Play that utilize the phone as a SOCKS proxy. Appthority has already confirmed one major enterprise incident response ...