What John Chambers Never Told You About Cisco Security
Get an insider's perspective on Cisco Security acquisitions since John Chambers' departure, and learn about the challenges often faced during an acquisition. The post What John Chambers Never Told You About Cisco ...
What IT Orgs Need to Know About the Growth of AI
Discover how the growth of AI impacts IT organizations — the GOOD (improved detections), the BAD (phishing, social engineering), & the UGLY (WormGPT, FraudGPT). The post What IT Orgs Need to Know ...
Introducing LLoda – Your Personal Security Assistant
While vendors strive to create easy to use products and organizations provide user training, it is clear that issues arise and end users have questions which ultimately affect productivity. Here’s a ...
Internet Threat Protection (or, how not to treat your org like middle schoolers)
Ok, y’all, we are now in the middle of post-covid work environments where the freedom of location has been a selling point for companies that have remote positions. But this freedom pairs ...
Storm-0558 and More: July’s Biggest Security Headlines
July 2023 saw a host of new vulns, especially in the wake of the Storm-0558 attack on Microsoft, the Fortinet RCE Flaw, and the CISCO AnyConnect Vulnerability. The post Storm-0558 and More: ...
Microsoft and Banyan Security: Joining Forces at Black Hat 2023 (Booth #1740)
Banyan Security continues to add valuable integrations into Microsoft’s suite of products including Azure, Entra ID, Microsoft 365 (formerly 0ffice 365) and much more. As a Microsoft Intelligent Security Association (MISA) partner, ...
Why Adversaries Hate Banyan SSE
Banyan Security’s mission has been the same since day one; enable the modern workforce to securely, safely, and easily access the applications and services they need, while working from anywhere. This means ...
Generative AI and the Future of Technical Writing
In the 1980s, when Generative AI was more a matter of speculation than a widespread implementation, philosopher John Searle proposed a thought experiment that he called the Chinese Room. He put forward ...
The Unknowing Insider: Don’t Be the Mole
Recently, I came across a slick new generative AI tool that proposed to take your presentation, read the content of each slide, give a generated background picture, and modify the layouts to ...
Why End Users Actually Care About Device Trust
Having a device with low trust levels looks like this: any place you visit, and then access the network is a nexus from which serious issues can spread. And with the right ...