how to
Internet Threat Protection (or, how not to treat your org like middle schoolers)
Ok, y’all, we are now in the middle of post-covid work environments where the freedom of location has been a selling point for companies that have remote positions. But this freedom pairs ...
Release Notes – New Features in Banyan Security (June 2023)
Welcome to our release highlights blog, where we delve into the exciting world of Banyan Security and uncover the release highlights for the month of June. In this fast-paced digital era, ensuring ...
VPNaaS 101 Part 3 – Tunnel Discovery and Configuration
When you're trying to configure a tunnel, you want to make sure that it's as specific and granular as possible to ensure least-privilege access. This 3-minute demo covers basic tunnel discovery and ...
VPNaaS 101 Part 2 – VPNaaS Tunnel Demo
In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in this short VPNaaS tunnel demo. The post VPNaaS 101 ...
VPNaaS 101 – Migrating to VPNaaS
So what is VPNaaS? It’s VPN as-a-service: a VPN that’s hosted without having to deploy traditional VPN appliances. This blog covers the benefits and considerations of migrating to VPNaaS, like cost, flexibility, ...
Three Ways to Opt Out of ChatGPT Data Sharing
Let’s keep this super-simple: the devil is in the details in any disclosure policy. If you go to the OpenAI ChatGPT FAQ, there are a few things that should raise the eyebrows ...
Secure Public Resources: Connect to Salesforce Using Banyan’s Service Tunnel
Corporate employees are often required to do work that involves using publicly-accessible resources (e.g., Salesforce or a staging website), which go beyond the bounds of private network control. In light of the ...
Secure Public Resources: Connect to Salesforce Using Banyan’s Service Tunnel
Corporate employees are often required to do work that involves using publicly-accessible resources (e.g., Salesforce or a staging website), which go beyond the bounds of private network control. In light of the ...
Everyman’s Cyber Defence
The following is my translation of “Jokamiehen kyberpuolustus”, Everyman’s Cyber Defence, a short snippet from publicly available document #kyberpuolustus : kyberkäsikirja Puolustusvoimien henkilöstölle (2019) by Laari, Flyktman, Härmä, Timonen and Tuovinen. Source ...
Enabling BYOD and Unregistered Devices
With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With ...