13 Results for:L2TP

  • Sort by: 

The pros and cons of VPNs for enterprises

By David Jacobs 28 Apr 2023

VPNs use different protocols and encryption to protect data and prevent unauthorized users from accessing company resources. But those protocols come with their own benefits and challenges. Read More

Mandiant: JumpCloud breach led to supply chain attack

By Rob Wright 24 Jul 2023

Mandiant researchers attribute the supply chain attack to a North Korean threat actor that abused JumpCloud's commands framework to gain access to a downstream customer. Read More

Microsoft fixes EoP zero-day on January Patch Tuesday

By Alex Scroxton 11 Jan 2023

On the first Patch Tuesday of 2023, Microsoft fixed an elevation of privilege vulnerability in Windows Advanced Local Procedure Call, which has been actively exploited in the wild and may be co-opted into ... Read More

VPN client alternatives: Layer 2 Tunneling Protocol (L2TP) over IPsec

By Lisa Phifer 31 Oct 2006

This month, Lisa Phifer discusses a robust VPN client alternative: Layer 2 Tunneling Protocol (L2TP) over IPsec. Read More

Evaluate if Chromebooks are secure enough for business use

By Gary Olsen 13 Sep 2021

Chromebooks are cost-effective endpoints that strip away desktop features for a simple desktop experience. Admins should evaluate if these endpoints are secure enough. Read More

How to use Java printf to format output

By Cameron McKenzie 06 Aug 2022

Learn by example how format output with the Java printf method. If you want to format dates, times, integers, doubles and Strings in the text you output to the console, logs or streams, you'll need ... Read More

The VPN Expert: VPN client alternatives, part 4 -- IPsec

By Lisa Phifer 10 Dec 2002

Here's a list of IPsec clients that run on many systems. See what they have to offer and what they are often missing. Read More