Blog
Thought leadership and musings on security topicsBy Category

Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify their target ...

The way we work has changed dramatically over the past few years. Gone are the days when we all worked in a centralized office, using only company-owned devices to access company applications and data. Today’s workforce is ...

It's popular because it's profitable and it's been a big moment for ransomware around the planet over the past few weeks. At Banyan, we decided to assemble the latest ransomware news for a mid-May Ransomware Threat Update (because ...

In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not knowing; threats are pervasive enough that everyone in living in the age of big data should know about them. Using real-life stories of privacy gone wrong, the authors make the reader want to protest, though, rather than put on a tinfoil hat.

When you're trying to configure a tunnel, you want to make sure that it's as specific and granular as possible to ensure least-privilege access. This 3-minute demo covers basic tunnel discovery and configuration to get your VPNaaS up and running as quickly as possible.

In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in this short VPNaaS tunnel demo.

So what is VPNaaS? It’s VPN as-a-service: a VPN that’s hosted without having to deploy traditional VPN appliances. This blog covers the benefits and considerations of migrating to VPNaaS, like cost, flexibility, and scalability.

Device trust has come a long way, and is evolving even faster, stimulated by integrations and vendors that are developing device-centric solutions. But it wasn’t always this way… in the early networking days, a device that didn’t have ...

The modern workforce is highly mobile and dispersed, with workers (employees, contractors, partners, etc.) using a variety of devices to access corporate data from various locations. As a result, traditional cybersecurity approaches ...

Let's keep this super-simple: the devil is in the details in any disclosure policy. If you go to the OpenAI ChatGPT FAQ, there are a few points that should raise the eyebrows of any security engineer trying to protect company data and ...

Digital transformation and the modern workforce posed unique challenges for cybersecurity, but the COVID-19 pandemic caused a seismic shift in the way businesses operate, with many organizations embracing remote work as a necessary ...

If it were an arm-wrestling match, it’s possible that SASE would beat SSE if measured by bulk force alone. But if you’ve ever watched arm-wrestling (or any kind of wrestling), sometimes power and agility count for more than size and ...