New & Notable
VPN security News
January 07, 2020
Threat actors appear to be exploiting vulnerable Pulse Secure VPN servers to hit enterprises with ransomware attacks, even though a patch has been available since April 2019.
October 08, 2019
Nation-state hackers are exploiting previously disclosed vulnerabilities in VPNs from Pulse Secure, Palo Alto Networks and Fortinet, according to a security advisory from the NSA.
June 18, 2019
DH2i's zero-trust architecture software, DxConnect, will address common security issues and bring microtunnel development, discreet invisibility, an open API and more.
February 12, 2019
Two senators called on the Department of Homeland Security to investigate the possibility that VPNs are allowing valuable information to be routed to foreign adversaries.
VPN security Get Started
Bring yourself up to speed with our introductory content
Given the differences in the security of LAN and WAN, enterprises need to guard against insider threats, secure against unauthorized access and potentially secure the edge, too. Continue Reading
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. Continue Reading
Evaluate VPN security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Infosec pros need to know the ins and outs of SSL/TLS VPNs vs. IPsec VPNs to better understand which product's features will fulfill the needs of their organization. Get help comparing here. Continue Reading
With help from artificial intelligence and automation, client VPN technologies could innovate the way they handle data flows within hybrid cloud environments. Continue Reading
Expert Karen Scarfone takes a look at the OpenVPN Access Server SSL VPN for securing network traffic by providing encrypted tunnels to the enterprise. Continue Reading
Manage VPN security
Learn to apply best practices and optimize your operations.
Don't let teleworkers compromise your enterprise's security. Follow these tips to ensure secure remote working in the event of a teleworker boom during a pandemic. Continue Reading
Disasters and pandemics occur unexpectedly, affecting companies, workers and networks alike. Plan a remote access strategy that covers VPN requirements, bandwidth demands and licenses. Continue Reading
Virtual networks add a layer of complexity to the real networks below them. Follow these three virtual network security measures to prevent complexity from creating issues. Continue Reading
Problem Solve VPN security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IPsec VPNs and SSL VPNs both encrypt network data, but they do it differently. Learn about the differences and how to determine the right solution for your organization. Continue Reading
A buffer underflow was found to be caused by a vulnerability in strongSwan's open source VPN. Learn how this is possible and how attackers can exploit it with Judith Myerson. Continue Reading
VPN vulnerabilities in products from popular vendors were recently found to enable serious threats. Discover how detrimental these threats are and best alternatives to the use of VPNs. Continue Reading