Okta breach blog - Den Jones quote

CSO’s Perspective: The Okta Breach and What It Means to the Broader Community

| | Blog
Den Jones shares his perspective as a CSO on the recent Okta breach, and what that means for the broader security community. The post CSO’s Perspective: The Okta Breach and What It Means to the Broader Community first appeared on Banyan Security ... Read More
privacy-in-the-age-of-big-data image of data on a road

Privacy in the Age of Big Data – A Must-Read

| | Blog
In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not knowing; threats are pervasive enough that ... Read More

How Banyan Remediates Threats

| | Blog
Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices that will help thwart attacks. At the same time we’re fighting for the ... Read More

How Banyan Remediates Threats

| | Blog
Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices that will help thwart attacks. At the same time we’re fighting for the ... Read More

Being a CSO in a Security Start-up

| | Blog
We all work in companies that have customers. As CSOs, we have to protect the business and reduce risk, however in a series B startup that makes security-based products and services, I know my role is different. If I worked in a company that was making gaming software, the expectations ... Read More
Article 2/5 – Eliminating Lateral Movement: Turn your office network into a guest network

Article 2/5 – Eliminating Lateral Movement: Turn your office network into a guest network

| | Blog
Neo..> Looks like we hooked a bunch of PharmaCORP users on our phishing trip Trinity..> I’m in! I’m on the user’s laptop. Neo….> What do you see? Trinity…> I’m scanning now, shit there’s thousands of devices Neo..> pull the memory and see what creds are there, any DA’s? Trinity..> yeah, ... Read More
Identity – Don’t Forget the Device

Identity – Don’t Forget the Device

| | Blog
TL;DR So, the quick summary and main points: Users, devices, and applications no longer exist solely on your corporate network Remote working now means that public networks are part of your ecosystem Attacks these days are resulting from your corporate network security being bypassed Access is provided to your data ... Read More

Banyan Security, Okta and LAPSUS$

| | Blog
The OKTA service has not been breached and remains fully operational. There are no corrective actions that need to be taken by our customers. Read more at our blog. The post Banyan Security, Okta and LAPSUS$ first appeared on Banyan Security ... Read More

Banyan Security, Okta and LAPSUS$

| | Blog
The OKTA service has not been breached and remains fully operational. There are no corrective actions that need to be taken by our customers. Read more at our blog. The post Banyan Security, Okta and LAPSUS$ first appeared on Banyan Security ... Read More
Zero Trust for Mergers & Acquisition Scenarios

Zero Trust for Mergers & Acquisition Scenarios

| | Blog
The Problem Day1…Welcome to the corporation, but sorry, you don’t have access to our applications. We’d love to let you read the acquired workforce welcome page but we’re still waiting to get the networks connected… Day1 is when the acquisition is legal and takes effect. During Mergers and Acquisitions (M&A) ... Read More