Articles by Den Jones

Privacy in the Age of Big Data – A Must-Read

In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not...

How Banyan Remediates Threats

Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices that will help thwart attacks. At the...

Being a CSO in a Security Start-up

We all work in companies that have customers. As CSOs, we have to protect the business and reduce risk, however in a series B startup that makes security-based products and services, I know my CSO role is different. If I worked in a company that was making gaming...

Vendor Lock-In, or Just Too Sticky?

What’s vendor lock-in? Vendor lock-in refers to your inability to easily switch from one vendor’s service or products to another’s. A quick reality check I’ve spent 25+ years as a practitioner and during that time I was responsible for delivering services to...

Zero Trust for Mergers & Acquisition Scenarios

The Problem Day1…Welcome to the corporation, but sorry, you don’t have access to our applications. We’d love to let you read the acquired workforce welcome page but we’re still waiting to get the networks connected… Day1 is when the acquisition is legal and...

Banyan Security Log4j Vulnerability Update

First, we want you to know that the Banyan Security solution is not impacted by the Log4j vulnerability. As Banyan’s Chief Security Officer, I not only want to make sure that the Banyan organization and product offering are safe, but I’m interested in...