by Den Jones | Nov 9, 2023 | Blog
I’ve been an Okta customer for over 15 years; both my Enterprise Security teams at Adobe and Cisco deployed their services and partnered with Okta on external facing services. Now, I’m a happy customer as we (Banyan) also leverage their services. With all of the mud...
by Den Jones | May 17, 2023 | Blog
In Privacy in the Age of Big Data, Theresa Payton and Ted Claypool tell us just how ubiquitous current threats to privacy are (which both the lay reader and security professionals will find disturbing). Of course, we’re better off knowing about threats than not...
by Den Jones | Feb 21, 2023 | Blog
Introduction There’s no escaping the number of breaches occurring daily, our media is full of them. As practitioners it feels like we’re pushing rope uphill as we try to convince organizations to adopt the basic security practices that will help thwart attacks. At the...
by Den Jones | Dec 22, 2022 | Blog
We all work in companies that have customers. As CSOs, we have to protect the business and reduce risk, however in a series B startup that makes security-based products and services, I know my CSO role is different. If I worked in a company that was making gaming...
by Den Jones | Nov 17, 2022 | Blog, How-To
What’s vendor lock-in? Vendor lock-in refers to your inability to easily switch from one vendor’s service or products to another’s. A quick reality check I’ve spent 25+ years as a practitioner and during that time I was responsible for delivering services to...
by Den Jones | Jun 28, 2022 | Blog, Improving Legacy Technology
Neo..> Looks like we hooked a bunch of PharmaCORP users on our phishing trip Trinity..> I’m in! I’m on the user’s laptop. Neo….> What do you see? Trinity…> I’m scanning now, shit there’s thousands of devices Neo..> pull the memory and see what creds are...
by Den Jones | Mar 29, 2022 | Blog, Improving Legacy Technology, Use cases
TL;DR So, the quick summary and main points: Users, devices, and applications no longer exist solely on your corporate network Remote working now means that public networks are part of your ecosystem Attacks these days are resulting from your corporate network...
by Den Jones | Mar 22, 2022 | Blog, Company News, How-To, Integrations
As Banyan Security’s Chief Security Officer, I want to not only make sure that the Banyan organization and product offering are safe, but also that our customers and partners are secure. First, we want you to know that the Banyan Security solution is not...
by Den Jones | Mar 7, 2022 | Blog, Use cases
The Problem Day1…Welcome to the corporation, but sorry, you don’t have access to our applications. We’d love to let you read the acquired workforce welcome page but we’re still waiting to get the networks connected… Day1 is when the acquisition is legal and...
by Den Jones | Feb 9, 2022 | Blog, Improved User Experience
Disclaimer: Before we start, the following applies to regular user accounts and is not advisable for privileged accounts or accounts that are unable to use multi-factor authentication (MFA). The Problem? As users, aren’t we sick of being forced to change our...
by Den Jones | Dec 16, 2021 | Blog, Company News
First, we want you to know that the Banyan Security solution is not impacted by the Log4j vulnerability. As Banyan’s Chief Security Officer, I not only want to make sure that the Banyan organization and product offering are safe, but I’m interested in...