CSO’s Perspective: The Okta Breach and What It Means to the Broader Community
Den Jones shares his perspective as a CSO on the recent Okta breach, and what that means for the broader security community. The post CSO’s Perspective: The Okta Breach and What It Means to the Broader Community first appeared on Banyan Security ... Read More
Privacy in the Age of Big Data – A Must-Read
In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not knowing; threats are pervasive enough that ... Read More
How Banyan Remediates Threats
Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices that will help thwart attacks. At the same time we’re fighting for the ... Read More
How Banyan Remediates Threats
Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices that will help thwart attacks. At the same time we’re fighting for the ... Read More
Being a CSO in a Security Start-up
We all work in companies that have customers. As CSOs, we have to protect the business and reduce risk, however in a series B startup that makes security-based products and services, I know my role is different. If I worked in a company that was making gaming software, the expectations ... Read More
Article 2/5 – Eliminating Lateral Movement: Turn your office network into a guest network
Neo..> Looks like we hooked a bunch of PharmaCORP users on our phishing trip Trinity..> I’m in! I’m on the user’s laptop. Neo….> What do you see? Trinity…> I’m scanning now, shit there’s thousands of devices Neo..> pull the memory and see what creds are there, any DA’s? Trinity..> yeah, ... Read More
Identity – Don’t Forget the Device
TL;DR So, the quick summary and main points: Users, devices, and applications no longer exist solely on your corporate network Remote working now means that public networks are part of your ecosystem Attacks these days are resulting from your corporate network security being bypassed Access is provided to your data ... Read More
Banyan Security, Okta and LAPSUS$
The OKTA service has not been breached and remains fully operational. There are no corrective actions that need to be taken by our customers. Read more at our blog. The post Banyan Security, Okta and LAPSUS$ first appeared on Banyan Security ... Read More
Banyan Security, Okta and LAPSUS$
The OKTA service has not been breached and remains fully operational. There are no corrective actions that need to be taken by our customers. Read more at our blog. The post Banyan Security, Okta and LAPSUS$ first appeared on Banyan Security ... Read More
Zero Trust for Mergers & Acquisition Scenarios
The Problem Day1…Welcome to the corporation, but sorry, you don’t have access to our applications. We’d love to let you read the acquired workforce welcome page but we’re still waiting to get the networks connected… Day1 is when the acquisition is legal and takes effect. During Mergers and Acquisitions (M&A) ... Read More