Internet Threat Protection (or, how not to treat your org like middle schoolers)

Internet Threat Protection (or, how not to treat your org like middle schoolers)

| | Blog, how to
Ok, y’all, we are now in the middle of post-covid work environments where the freedom of location has been a selling point for companies that have remote positions. But this freedom pairs ...
Banyan June Release Features �

Release Notes – New Features in Banyan Security (June 2023)

Welcome to our release highlights blog, where we delve into the exciting world of Banyan Security and uncover the release highlights for the month of June. In this fast-paced digital era, ensuring ...
VPNaaS 101 Part 3 - Tunnel Discovery + Configuration - Ashur Kanoon Banyan Security

VPNaaS 101 Part 3 – Tunnel Discovery and Configuration

| | Blog, how to, Use Cases
When you're trying to configure a tunnel, you want to make sure that it's as specific and granular as possible to ensure least-privilege access. This 3-minute demo covers basic tunnel discovery and ...
VPNaaS 101 Part 2 - Tunnel Demo + Config - Ashur Kanoon Banyan Security

VPNaaS 101 Part 2 – VPNaaS Tunnel Demo

| | Blog, how to, Use Cases
In this 5-minute video blog, Ashur Kanoon takes us through VPN as-a-service (VPNaaS); see how easy it is from configuration to deployment in this short VPNaaS tunnel demo. The post VPNaaS 101 ...
VPNaaS 101 - Migration - Ashur Kanoon Banyan Security

VPNaaS 101 – Migrating to VPNaaS

| | Blog, how to, Use Cases
So what is VPNaaS? It’s VPN as-a-service: a VPN that’s hosted without having to deploy traditional VPN appliances. This blog covers the benefits and considerations of migrating to VPNaaS, like cost, flexibility, ...
opt out of chatgpt data sharing represented by a cyberpunk circuit globe

Three Ways to Opt Out of ChatGPT Data Sharing

| | Blog, how to
Let’s keep this super-simple: the devil is in the details in any disclosure policy. If you go to the OpenAI ChatGPT FAQ, there are a few things that should raise the eyebrows ...
Service Tunnel to Salesforce

Secure Public Resources: Connect to Salesforce Using Banyan’s Service Tunnel

Corporate employees are often required to do work that involves using publicly-accessible resources (e.g., Salesforce or a staging website), which go beyond the bounds of private network control. In light of the ...
Service Tunnel to Salesforce

Secure Public Resources: Connect to Salesforce Using Banyan’s Service Tunnel

Corporate employees are often required to do work that involves using publicly-accessible resources (e.g., Salesforce or a staging website), which go beyond the bounds of private network control. In light of the ...

Everyman’s Cyber Defence

The following is my translation of “Jokamiehen kyberpuolustus”, Everyman’s Cyber Defence, a short snippet from publicly available document #kyberpuolustus : kyberkäsikirja Puolustusvoimien henkilöstölle (2019) by Laari, Flyktman, Härmä, Timonen and Tuovinen. Source ...
Allow Unregistered Devices to Access Services image

Enabling BYOD and Unregistered Devices

| | Blog, how to, Use Cases
With Black Friday and Cyber Monday out of the way and the holidays right around the corner, IT folks are preparing to get the usual “new device” calls and helpdesk tickets. With ...

Secure Coding Practices