VPN’s

Implementing ZTNA: 4 Reasons Why Mobile is a Good Place to Start

ZTNA is a good fit for today's remote workforce, and mobile is a perfect landscape to implement a ZTNA strategy…

3 weeks ago

8 Best Practices for Secure Remote Work Access

As more and more employees have transitioned to working remotely, the cybersecurity threats that their organizations face have changed. While...…

6 months ago

Sledgehammer VPN Approach Not Serving Apps, Users or IT

In the new work from home paradigm, zero trust and SASE should take the place of the traditional sledgehammer VPN…

8 months ago

Increase in Small DDoS Attacks Could Take Down VPNs

Data breaches and ransomware might hog the headlines, but don’t forget to pay attention to DDoS attacks. According to research…

8 months ago

Do VPNs Actually Protect Your Privacy?

With privacy a growing concern, it makes sense that an increasing number of people are turning to VPNs to protect…

1 year ago

Are Free VPNs Safe?

An honest discussion about whether it’s safe to use free VPNs Let’s talk about free VPNs. Typically, when we get…

1 year ago

VPN Leaks: Knowing, Understanding and Preventing

VPNs have become much more popular as a way for people to keep their data secure in an increasingly insecure…

2 years ago

VPNs Aren’t Dead, They Just Need to Evolve

Companies have long relied on VPNs to secure corporate data and devices for remote workers, suppliers, contractors and other people…

3 years ago

SOCKS Proxy SDKs a New Risk for Enterprises

As an alternative to advertising, monetization SDKs are being used in apps in Google Play that utilize the phone as…

3 years ago