unknowing insider represented by manhole in a dark street - Banyan Security

The Unknowing Insider: Don’t Be the Mole

| | Blog
Recently, I came across a slick new generative AI tool that proposed to take your presentation, read the content of each slide, give a generated background picture, and modify the layouts to produce a work that looked like it had a team of designers cranking all weekend on it. Using ... Read More
chatgpt-spear-phishing

ChatGPT Spearphishing: Social Engineering at Scale

| | Blog, Use Cases
Modern-day SDRs (sales development reps) perform acts of phishing for a living. Today’s business culture, especially in technology sales, accepts this as how business gets done. They do lead generation to identify their target company, cadence messaging to engage and interact with an individual at the target company, and finally, ... Read More
Hand holding phone protected by Banyan Security

Device-Centricity

Oh, network-centered security. What a brilliant idea. Let’s put all our faith in the network and forget about those pesky little devices that connect to it. Who needs to worry about laptops, tablets, and smartphones, anyway? They’re just small, insignificant pieces of technology that have absolutely no bearing on our ... Read More

Device-Centric Security at Banyan

Compare sitting at a desk today to sitting at a desk five or ten years ago; the way we work and access information has drastically changed. Employees may or may not be at their desks in a centralized office, working on desktop computers connected to a secure network. Instead, they ... Read More
How Banyan SSE handles modern threat vectors

Modern Threat Vectors and Device-Centricity

| | Blog
Withstanding threat vectors are the true test of any security platform. Colin Rand discusses Banyan's device-centric Security Service Edge and with a step-by-step breakdown of an attack. The post Modern Threat Vectors and Device-Centricity first appeared on Banyan Security ... Read More
This diagram illustrates the differentiated access needed for the different types of roles needed to access our environments.

Blog: Banyan @ Banyan Part II – Protecting R&D

| | Blog
This is the second in a series of blogs on dogfooding your own product. The first in this series covered how we approached compliance, and in this one we’ll look at how we went about protecting other critical R&D assets. In later posts, we’ll cover remote access and InfoSec, and ... Read More
This diagram illustrates connecting to each of the 5 interfaces: Product Console, Containers, Kubernetes, Databases and Cloud Infrastructure.

Banyan @ Banyan Part I – Why Do I Enjoy Dogfood?

| | Blog
Dogfooding your own product is a long-standing tradition in software development. The benefits are many – from finding and fixing glitches before any customer rollout to developing empathy for the end user (since that end user is you). Great stories arise from the efforts to deploy and use your own ... Read More

Secure Remote Access – An Engineer’s Pain

| | Blog
Engineering teams need secure access to dynamic hosts, services, and applications to productively do their jobs. VPNs, falling short of today’s security requirements with their “one size fits all” strategy, are often at the core of serious usability, manageability, and security issues. Lately, Zero Trust is all the buzz, and ... Read More