by Ashur Kanoon | Oct 20, 2022 | Blog, How-To
In this multi-part series, we’ll look at what organizations can do to better improve corporate cybersecurity as part of October’s Cybersecurity Awareness Month. In this blog, our focus is using strong passwords. Passwords and passcodes are now required on almost all...
by Ashur Kanoon | Oct 13, 2022 | Blog, Improving Legacy Technology
Zero Trust incorporates many security principles, and assessing device trust by using device identity and posture is one of them. So how is this done and what are some of the frameworks to keep in mind? While the concepts of device identity and device posture...
by Ashur Kanoon | Oct 11, 2022 | Blog, Improving Legacy Technology
In this multi-part series, we’ll look at what organizations can do to better improve corporate security as part of October’s Cybersecurity Awareness Month. In this blog, our focus is on multi-factor authentication (MFA). Believe it or not, computers in the old days...
by Ashur Kanoon | Sep 29, 2022 | Blog, How-To, Improving Legacy Technology
In 2004, distributed denial of service (DDoS) attacks were common and those types of attacks were doubling every few months. eBay was hacked and 233 million user records were stolen. Domino’s Pizza was undergoing a ransomware attack. The U.S. Secret Service was...
by Ashur Kanoon | Sep 22, 2022 | Blog, Improving Legacy Technology
To learn about how we got to Zero Trust Network Access (ZTNA), we need to look at the evolution of remote access. Remote Access Enterprise VPNs (Virtual Private Networks) have evolved quite a bit over the years. They first became important when employees were being...
by Ashur Kanoon | Sep 20, 2022 | Blog, Improving Legacy Technology, Use cases
Internet Protocol Security (IPsec) was introduced in the 1990s and is the traditional site-to-site Virtual Private network (VPN) method. It was also initially used for remote access VPN but proved difficult to deploy since key distribution was needed, and managing the...
by Ashur Kanoon | Sep 12, 2022 | Blog, Improving Legacy Technology
Remote Access VPNs have been around for over 20 years. Having worked in this space for a long time, I know the early evolution was fast. We went from dedicated concentrators to beefier appliances with crypto accelerators to integrated functionality in next-generation...
by Ashur Kanoon | Sep 6, 2022 | Blog, Use cases
HIPAA, the Health Insurance Portability and Accountability Act, section 164.312, provides guidelines for administrative and technical safeguards to help protect sensitive healthcare data and protected health information (PHI). Banyan Security’s Zero Trust Network...
by Ashur Kanoon | Sep 2, 2022 | Blog, Improving Legacy Technology
By now, you’ve surely heard about some of the breaches that have been happening when company A gets illegally accessed via threat actors hacking into one of company A’s vendors. Microsoft was breached when hackers got into SolarWinds. Twilio was recently breached when...
by Ashur Kanoon | Aug 29, 2022 | Blog, How-To
The adoption of SaaS (Software as a Service) started as far back as the 1960s, but picked up steam in the late 1990s when Salesforce introduced their CRM that used “cloud computing”. Today, there isn’t an organization that isn’t using many SaaS applications. In fact,...
by Ashur Kanoon | Aug 23, 2022 | Blog
Agentless ZTNA may seem appealing, but it has significant limitations despite its advantages in deployment, management, and training. As an administrator responsible for ensuring top-notch security and optimal user experience, it is crucial to comprehend these...