All
cybersecurity roundup Q

A “cursed” domain, a biodata bill of rights, and more: Q1 ’20 cybersecurity roundup

In our first roundup post of the decade, I’ve included interesting articles whose topics include hacking satellites, the difference in mindset between technologists and...

joanna

VPN security for a rapidly scaling remote workforce

We’ve all had days when we think to ourselves, “Man, I wish I could just work from home in my PJs.” Recently, as companies...

VPN malware protection

Almost every organization is equipped with VPNs to support a remote workforce these days. Often, secure VPNs use a no-split secure tunnel, tunneling all...

Detecting VPN traffic on the network

Detecting VPN traffic on the network is a use case I hear daily from school systems ranging from primary schools all the way up through...

jake

Network capacity planning fundamentals

Are we properly utilizing these expensive WAN links? That is probably a question you have asked yourself on more than one occasion when you...

elgin eclectic society

The strategic approach to adtech monitoring

When exploring how digital advertising affects users on a daily basis, you may wonder what solutions are in place to monitor complex systems in...

jake

Securing third-party VPN access

We all know that VPN monitoring is something every network and security engineer should be familiar with, but with the recent uptick of changes in...

elgin

The strategic approach to network performance monitoring

When speaking with customers about what they need to support their infrastructure, the thing we hear most is “network performance monitoring.” This blog will...

how to monitor vpn traffic

How to monitor VPN traffic

More and more people are working from home. Now, organizations need a way to understand the role a remote workforce plays in their network...