Archive for June, 2009

What We're Reading, Week of 6/22

Posted: 25th June 2009 by VPN Haus in Highlights

SearchSecurity… Cloud computing security: Choosing a VPN type to connect to the cloud Friend of NCP, Diana Kelley, analyst at SecurityCurve is writing a series on cloud computing security. In this 1st part series, Diana drills down and discusses the specifics regarding devices that connect to the cloud, and how VPNs affect cloud security. The […]

What We’re Reading, Week of 6/22

Posted: 25th June 2009 by VPN Haus in Highlights

SearchSecurity… Cloud computing security: Choosing a VPN type to connect to the cloud Friend of NCP, Diana Kelley, analyst at SecurityCurve is writing a series on cloud computing security. In this 1st part series, Diana drills down and discusses the specifics regarding devices that connect to the cloud, and how VPNs affect cloud security. The […]

what we're reading, week of 6/15

Posted: 19th June 2009 by VPN Haus in Highlights

End-Point Security.Info… Employees Couldn’t Care Less about Data Security Gathering information from the Ponemon Institute, Agent Smith provides shocking statistics about employees and their security practices. So how does this list relate to VPNs? I’m glad you asked! Users will bypass cumbersome VPN policies if they can get away with it. Network admin’s need to […]

what we’re reading, week of 6/15

Posted: 19th June 2009 by VPN Haus in Highlights

End-Point Security.Info… Employees Couldn’t Care Less about Data Security Gathering information from the Ponemon Institute, Agent Smith provides shocking statistics about employees and their security practices. So how does this list relate to VPNs? I’m glad you asked! Users will bypass cumbersome VPN policies if they can get away with it. Network admin’s need to […]

Browser-based Backdoor Attack for SSL?

Posted: 17th June 2009 by VPN Haus in 64-Bit, Highlights

Read an interesting post last week on ThreatPost, New attack class exploits intranet weaknesses. Dennis Fisher reports on a new class of attacks caused by organizations using non-routable IP space on their internal networks—including an attack that compromises VPN users through the use of a persistent JavaScript backdoor. The research was done by Robert Hansen, […]