While vendors strive to create easy to use products and organizations provide user training, it is clear that issues arise and end users have questions which ultimately affect productivity. Here’s a quick look at some interesting stats on IT and helpdesk calls: The average company receives 25 IT support tickets per day. Source: […]
Blog
Ok, y’all, we are now in the middle of post-covid work environments where the freedom of location has been a selling point for companies that have remote positions. But this freedom pairs with the adage “with great power comes great responsibility,” where we are relying on our end users to police their own internet activity. […]
July 2023 welcomed several updates to our Banyan suite of Security Service Edge solutions. Below, you’ll find detailed release notes and we welcome you to subscribe to our updates to stay informed of what’s new and what’s coming. Find our July 2023 release notes below: Generally Available Features Netagent Health Check: New health check endpoint that provides […]
July 2023 saw a host of new vulns, especially in the wake of the Storm-0558 attack on Microsoft, the Fortinet RCE Flaw, and the CISCO AnyConnect Vulnerability.
Banyan Security continues to add valuable integrations into Microsoft’s suite of products including Azure, Entra ID, Microsoft 365 (formerly 0ffice 365) and much more. As a Microsoft Intelligent Security Association (MISA) partner, Banyan has been invited to the Microsoft booth at Black Hat USA in August 2023 and will be showcasing how Microsoft and Banyan […]
Banyan Security’s mission has been the same since day one; enable the modern workforce to securely, safely, and easily access the applications and services they need, while working from anywhere. This means the good guys get access to what is needed, and the adversaries get access to nothing.
In the 1980s, before Generative AI was even a speculation, philosopher John Searle proposed a thought experiment that he called the Chinese Room. He put forward a hypothetical scenario in which a person confined to a room receives paper messages through a slot in the wall. The person is then tasked with returning intelligible responses […]
Recently, I came across a slick new generative AI tool that proposed to take your presentation, read the content of each slide, give a generated background picture, and modify the layouts to produce a work that looked like it had a team of designers cranking all weekend on it. Using this tool would give you […]
Having a device with low trust levels looks like this: any place you visit, and then access the network is a nexus from which serious issues can spread. And with the right amount of logging and forensic information, the issue can be traced back to you.
If you’ve been looking for a Security Service Edge (SSE) solution, especially ZTNA or VPN as-a-service, then you’ve most definitely heard the term PoP. Most vendors are quick to emphasize the number of PoPs they offer, and some have started talking about dynamic PoPs. With so many market and customer questions around PoPs, I thought I’d spend some time on the subject.
Have you felt like you’re hearing more about spearphishing in the news? There’s a reason why: in the ever-expanding landscape of cyber threats, spearphishing has increased this year as a particularly insidious (but effective) tactic employed by threat actors to breach organizational defenses. From APTs to decentralized digital mercenaries, there are simply more attacks this […]
Why is everyone talking about OpenAI’s ChatGPT? Well, unless you’re still using a dial-up modem, then you’ve likely heard chatter on social media, at work, or at a conference. While mainstream news paints ChatGPT as a static bit of software, those that have been following the tool for a few years have seen rapid evolution […]