This blog post is a summary of this week’s Information Security News put together by our Security Incident Response Team (SIRT).
VPN history starts back in 1996, when a Microsoft employee started developing the Peer to Peer Tunneling Protocol (PPTP). In 1999, the specification was published.
Since then, VPN protocol technology has evolved and, at the moment, there are five widely used VPN protocols.
A breakdown of these five VPN protocols complete with their pros and cons is key to understanding VPN protocols in depth.
Top 5 Security News
Image by Stefan Coders from Pixabay