Blog

The negative effects of checking for user credentials at the beginning of a session and granting hours-long access have surfaced many issues, sometimes leading to major security incidents, for users and organizations alike. Continuously checking is an option but not all checks are created equally. Let’s look continuous authentication vs continuous authorization to see which […]

The evolution of the cybersecurity market has been to a great extent driven by the “arms race” between attackers and security professionals. Each iterative advance by one group has typically been met by a counter-response from the other that attempts to circumvent or neutralize the advances, and so on. Rinse and repeat. A similar cat-and-mouse […]

As a frequent contributor and daily reader of r/VPN on Reddit, I see a lot of consumer VPN questions for vendors like NordVPN, ExpressVPN, OpenVPN, and Private Internet Access (PIA). Let’s look at a few use cases for these and a few things to consider when looking for consumer VPNs (especially for those considering VPN […]

We all work in companies that have customers. As CSOs, we have to protect the business and reduce risk, however in a series B startup that makes security-based products and services, I know my CSO role is different. If I worked in a company that was making gaming software, the expectations of my role wouldn’t […]

In the dynamic world of cybersecurity, ‘authentication and authorization’ are not just buzzwords; they are essential pillars. These processes should be multifaceted, moving beyond basic username or group-based methods. This is where the integration of User and Entity Behavior Analytics (UEBA) becomes crucial, offering a more nuanced look at not just user actions but also […]

With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With over $9B spent on Black Friday itself, you can pretty much guarantee some of your co-workers got a new computer or mobile device. […]

The more prospects I talk to, the more I hear about the dreaded SaaS downtime. Downtime isn’t just an inconvenience. Organizations count on SaaS vendors to ensure certain levels of uptime, so that the organizations themselves can continue to run their business. So, what is a responsible SaaS downtime? Using the 99.999% standard, you’re looking […]

Remote Desktop Protocol (RDP) is a proprietary protocol developed by Microsoft which provides a user with a graphical interface to connect to a Windows-based computer over a network connection. The user employs RDP client software for this purpose, while the other computer must run RDP server software. Browser-based access is also supported, eliminating the need […]

With another year of record growth under our belt, Banyan Security is expanding its partner program, shifting its go to market focus to better leverage a channel-centric model. Growth has stemmed from a strong focus on a self-serve ZTNA and SSE solution in what is a historically very complicated network security space. To continue this […]

It’s been almost 3 years since the world changed and everyone learned what a pandemic is. Students were told to stay home, and school district IT teams were trying to figure out how to get everyone together so that learning continued. With kids at home, working parents now had to be home. While some organizations […]

We can all be thankful for so much of what’s going on this Thanksgiving. Very important things like good health, family and friends, and so much more. We can also be thankful for some of the stuff that we need to use every day to do our jobs and just get by in this tech-connected […]