Blog
Thought leadership and musings on security topicsBy Category

Corporate employees are often required to do work that involves using publicly-accessible resources (e.g., Salesforce or a staging website), which go beyond the bounds of private network control. In light of the need to connect their ...

There's lots of talk about zero trust these days, much of it centered on how it compares with legacy VPN technology.
VPNs, or Virtual Private Networks, have been around for quite some time. But in their legacy form, remote access ...

The negative effects of checking for user credentials at the beginning of a session and granting hours-long access have surfaced many issues, sometimes leading to major security incidents, for users and organizations alike. ...

Garrett Bekker III
Principal Research Analyst, Information Security at 451 Research, part of S&P Global Market Intelligence
@gabekker
The evolution of the cybersecurity market has been to a great extent driven by the ...

As a frequent contributor and daily reader of r/VPN on Reddit, I see a lot of consumer VPN questions for vendors like NordVPN, ExpressVPN, OpenVPN, and Private Internet Access (PIA). Let’s look at a few use cases for these and a few ...

We all work in companies that have customers. As CSOs, we have to protect the business and reduce risk, however in a series B startup that makes security-based products and services, I know my role is different. If I worked in a ...

Authentication and authorization can and should be based on many factors. Relying solely on a username or group leaves a lot to be desired, especially when thinking about how to continuously layer on checks and balances to increase ...

With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With over $9B spent on Black Friday itself, you can pretty ...

The more prospects I talk to, the more I hear about the dreaded SaaS downtime. Downtime isn’t just an inconvenience. Organizations count on SaaS vendors to ensure certain levels of uptime, so that the organizations themselves can ...

RDP Introduction
Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to a Windows-based computer over a network connection. The user employs RDP ...

With another year of record growth under our belt, Banyan Security has shifted its go to market focus to better leverage a channel-centric model.
Growth has stemmed from a strong focus on a self-serve ZTNA and SSE solution in what is ...

How do system admins protect their company's sensitive data, which is hosted in multiple environments and accessed by employees and contractors in changing locations?
This is what Banyan’s ZTNA solution allows admins to do. And now, ...