Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers


VPNs are commonly used to give users working from home access to corporate resources. But traditional forced tunnel VPNs can have a significant impact on the performance of cloud services like Office 365. In this article, I look at the different ways VPNs can be configured for performance and security.

The post Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers appeared first on Petri.

Continue reading Split Tunnel VPNs Improve Performance of Cloud Apps for Remote Workers

Hackers Continue to Exploit Patched Pulse Secure VPN Flaws, CISA Warns

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning that bad actors are still exploiting a known vulnerability in a popular VPN appliance a full year after the vendor patched the flaws. Most Pulse Secure VPN users h… Continue reading Hackers Continue to Exploit Patched Pulse Secure VPN Flaws, CISA Warns

New Linux Bug Lets Attackers Hijack Encrypted VPN Connections

A team of cybersecurity researchers has disclosed a new severe vulnerability affecting most Linux and Unix-like operating systems, including FreeBSD, OpenBSD, macOS, iOS, and Android, that could allow remote ‘network adjacent attackers’ to spy on and t… Continue reading New Linux Bug Lets Attackers Hijack Encrypted VPN Connections

Fake NordVPN Web Site Drops Banking Malware Spotted in the Wild

I’ve recently came across to a rogue NordVPN web site distributing malicious software potentially exposing NordVPN users to a multi-tude of malicious software further compromising the confidentiality availability and integrity of the targeted host to a… Continue reading Fake NordVPN Web Site Drops Banking Malware Spotted in the Wild

OpenVPN vs. IKEv2 vs. L2TP: Which VPN Protocol is the Best?  

A virtual private network (VPN) provides users with privacy and secure data when they browse the internet or engage in online activity. One of the most crucial elements of a VPN is the protocol that protects user anonymity from hackers, advertisement … Continue reading OpenVPN vs. IKEv2 vs. L2TP: Which VPN Protocol is the Best?