Blog
Thought leadership and musings on security topicsBy Category

Welcome to our release highlights blog, where we delve into the exciting world of Banyan Security and uncover the release highlights for the month of June. In this fast-paced digital era, ensuring the utmost security has become ...

Let's talk about the darker side of the ChatGPT security story: a recent DarkReading report found that 4% of workers are leaking protected corporate information into AI tools by feeding schematics, statistics, instructions, and other ...

On April 4th, 2023, we announced our expanded device-centric Security Service Edge (SSE) solution. From company inception, we decided that an approach to access and security built devices outward provided the biggest advantage to our ...

The cornerstone of a viable zero trust solution is that it must be able to successfully handle the wide variety of applications, both legacy and modern, that are being used within corporations today. While that statement seems ...

Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify their target ...

The way we work has changed dramatically over the past few years. Gone are the days when we all worked in a centralized office, using only company-owned devices to access company applications and data. Today’s workforce is ...

It's popular because it's profitable and it's been a big moment for ransomware around the planet over the past few weeks. At Banyan, we decided to assemble the latest ransomware news for a mid-May Ransomware Threat Update (because ...

In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not knowing; threats are pervasive enough that everyone in living in the age of big data should know about them. Using real-life stories of privacy gone wrong, the authors make the reader want to protest, though, rather than put on a tinfoil hat.

When you're trying to configure a tunnel, you want to make sure that it's as specific and granular as possible to ensure least-privilege access. This 3-minute demo covers basic tunnel discovery and configuration to get your VPNaaS up and running as quickly as possible.

In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in this short VPNaaS tunnel demo.

So what is VPNaaS? It’s VPN as-a-service: a VPN that’s hosted without having to deploy traditional VPN appliances. This blog covers the benefits and considerations of migrating to VPNaaS, like cost, flexibility, and scalability.

Device trust has come a long way, and is evolving even faster, stimulated by integrations and vendors that are developing device-centric solutions. But it wasn’t always this way… in the early networking days, a device that didn’t have ...