New & Notable
VPN security News
January 30, 2018
Experts urge users to patch a new Cisco ASA vulnerability that earned the most critical CVSS score of 10.0 and could lead to remote code execution and denial-of-service attacks.
January 17, 2018
Cloudflare takes inspiration from Google's BeyondCorp with a new service called Cloudflare Access, which aims to replace corporate VPNs and embrace perimeter-less security.
February 27, 2017
After Google rolled out the latest version of Chrome, Blue Coat proxy software issues prompt rollback of TLS 1.3 support in latest version of Chrome browser.
October 13, 2016
Academic researchers show how to place undetectable encryption backdoors in cryptographic keys and passively decrypt data, which could undermine confidence in certain algorithms.
VPN security Get Started
Bring yourself up to speed with our introductory content
IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic. Continue Reading
An SSL VPN is a type of virtual private network that uses the Secure Sockets Layer protocol -- or, more often, its successor, the Transport Layer Security (TLS) protocol -- in standard web browsers to provide secure, remote-access VPN capability. Continue Reading
Secure Sockets Layer (SSL) is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet. Continue Reading
Evaluate VPN security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Karen Scarfone takes a look at the OpenVPN Access Server SSL VPN for securing network traffic by providing encrypted tunnels to the enterprise. Continue Reading
Expert Karen Scarfone takes a look at the Pulse Connect Secure series of SSL VPNs for securing the connection between clients and networks through encrypted tunnels. Continue Reading
The SonicWALL SSL VPN protects remote client devices by creating a secure connection to enterprise networks, with many options for customized security features. Continue Reading
Manage VPN security
Learn to apply best practices and optimize your operations.
HEIST, a new HTTP/2 protocol exploit, can steal encrypted content from HTTPS traffic. Expert Michael Cobb explains how this attack works and how to stop it. Continue Reading
An HTTPS session with a reused nonce is vulnerable to the Forbidden attack. Expert Nick Lewis explains how the attack works, and how to properly secure HTTPS-authenticated sites. Continue Reading
How can enterprises enable mobility while insulating corporate networks from mobile malware? Per-app VPN tunnels offer secure remote access when combined with other measures. Continue Reading
Problem Solve VPN security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
VPN vulnerabilities in products from popular vendors were recently found to enable serious threats. Discover how detrimental these threats are and alternatives to the use of VPNs. Continue Reading
The BENIGNCERTAIN exploit affects certain versions of Cisco systems using the IKEv1 protocol. Expert Nick Lewis explains what the protocol does and how the vulnerability works. Continue Reading
There are many free VPN clients on the market, but are they secure enough for enterprise users? Expert Judith Myerson looks at the pros and cons of ad-supported VPNs. Continue Reading