Blog
Thought leadership and musings on security topicsBy Category

How much something costs has been a historical source of tension and irritation for consumers when buying stuff. We’ve all been there – not getting straight answers when trying to buy a car, finding out that your new no-fee credit ...

Oh, network-centered security. What a brilliant idea. Let's put all our faith in the network and forget about those pesky little devices that connect to it. Who needs to worry about laptops, tablets, and smartphones, anyway? They're ...

Compare sitting at a desk today to sitting at a desk five or ten years ago; the way we work and access information has drastically changed. Employees may or may not be at their desks in a centralized office, working on desktop ...

The CASB, or Cloud Access Security Broker, was born out of necessity in response to the rapid increase in use of cloud-based services and SaaS applications. Traditionally, organizations have protected their on-premises sensitive data ...

Withstanding threat vectors are the true test of any security platform. Colin Rand discusses Banyan's device-centric Security Service Edge and with a step-by-step breakdown of an attack.

It’s widely recognized that change is a universal constant and nowhere has that been more apparent than in the dramatic changes we’ve seen over the last few years in the composition, complexity, and potential of the modern workforce. ...

We shared an overview of Banyan Security’s latest product offering, a Security Service Edge composed of: ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway), CASB (Cloud Access Security Broker) and VPNaaS (VPN-as-a-Service) ...

As the world continues to evolve and adopt new technologies, the modern workforce has changed significantly, and so have the opportunities and challenges that come with it. The advent of mobile devices, combined with the explosion of ...

“Zero Trust” is a cybersecurity framework and philosophy that assumes no user, device, or network can be inherently trusted. Instead, it requires the verification of every user and device attempting to access resources on a network, ...

It’s pronounced “swig” and it’s definitely a cybersecurity cocktail: secure web gateways are a mix of tools specifically designed to protect users and their devices while browsing the internet. If you ask Gartner, a secure web gateway ...

Last year in 2022, there were 1,802 data compromises affecting more than 422 million people – but the LastPass data breach is the one that has security practitioners chatting. The original incident happened in August of 2022. ...

Malvertising (the nefarious practice of placing digital ads leading to malware) has been making a resurgence over the past few weeks. For quite a while, cybercriminal gangs have been making fake websites leading to downloads of ...