Blog

On April 4th, 2023, we announced our expanded device-centric Security Service Edge (SSE) solution. From company inception, we decided that an approach to access and security built devices outward provided the biggest advantage to our customers. In this blog, we’ll take a look at why we took a device-centric approach in architecture, and highlight some […]

The cornerstone of a viable zero trust solution is that it must be able to successfully handle the wide variety of applications, both legacy and modern, that are being used within corporations today.  While that statement seems obvious, it can be used to quickly differentiate between a comprehensive Security Service Edge solution and an offering […]

Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify their target company, cadence messaging to engage and interact with an individual at the target company, and finally, deliver the ‘payload’ — often […]

The way we work has changed dramatically over the past few years. Gone are the days when we all worked in a centralized office, using only company-owned devices to access company applications and data. Today’s workforce is distributed, and people use a variety of devices to access work resources, from laptops and smartphones to tablets […]

It’s popular because it’s profitable and it’s been a big moment for ransomware around the planet over the past few weeks. At Banyan, we decided to assemble the latest ransomware news for a mid-May Ransomware Threat Update (because there’s been enough of it to warrant its own blog). Ransomware has become ever more targeted, with […]

In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not knowing; threats are pervasive enough that everyone in living in the age of big data should know about them. Using real-life stories of privacy gone wrong, the authors make the reader want to protest, though, rather than put on a tinfoil hat.

When you’re trying to configure a tunnel, you want to make sure that it’s as specific and granular as possible to ensure least-privilege access. This 3-minute demo covers basic tunnel discovery and configuration to get your VPNaaS up and running as quickly as possible.

So what is VPNaaS? It’s VPN as-a-service: a VPN that’s hosted without having to deploy traditional VPN appliances. This blog covers the benefits and considerations of migrating to VPNaaS, like cost, flexibility, and scalability.

Device trust has come a long way, and is evolving even faster, stimulated by integrations and vendors that are developing device-centric solutions. But it wasn’t always this way… in the early networking days, a device that didn’t have a user (for example, a printer) would be put on a segmented network that wasn’t even secured. […]

The modern workforce is highly mobile and dispersed, with workers (employees, contractors, partners, etc.) using a variety of devices to access corporate data from various locations. As a result, traditional cybersecurity approaches based on network perimeters are no longer sufficient. Banyan Security’s Security Service Edge (a device-centric SSE) has emerged as a new approach to […]

Let’s keep this super-simple: the devil is in the details in any disclosure policy. If you go to the OpenAI ChatGPT FAQ, there are a few points that should raise the eyebrows of any security engineer trying to protect company data and access. To that purpose, at the end of this blog, you’ll find three […]