Finjan Holdings, Inc. – Corporate Overview Video

Finjan TeamAbout Us, Blog

Finjan Finjan Holdings, Inc.   Corporate Overview Video

As a 20 year veteran in cybersecurity, Finjan pioneered behavior-based threat detection. In 2016, Finjan returned to profitability and for the first time as a publicly traded Nasdaq company. Today we are stronger than ever. “Cybersecurity today is a global issue and the increasing complexity of cyberattacks demands new and innovative ways to secure corporate data and protect consumer information,” … Read More

Cybersecurity Risk Assessment – Qualitative vs Quantitative Assessments

Finjan TeamBlog, Cybersecurity

Finjan Cybersecurity Risk Assessment   Qualitative vs Quantitative Assessments

The overall security status of an organization is made up of inputs from the various business units which in turn make up the enterprise – such as Operations, Development, Finance, Audit, and Compliance. One way of establishing the contribution from each department is by assigning it a “risk status” on the basis of cybersecurity risk assessment performed on it over … Read More

The Evolving Role of Artificial Intelligence in Cybersecurity

Finjan TeamBlog, Cybersecurity

Finjan The Evolving Role of Artificial Intelligence in Cybersecurity

It’s often been observed that technological advancement is a double-edged sword – and this is especially true in the realm of cybersecurity. Attackers have been known to use automation technology to stage and sustain their strikes – while those same machine learning algorithms and real-time response mechanisms can help enterprises that suffer an assault to speed up their efforts at … Read More

Anatomy of a TCP Sequence Prediction Attack

Finjan TeamBlog, Cybersecurity

Finjan Anatomy of a TCP Sequence Prediction Attack

With so much of our business and personal lives relying on the transfer of information between points on the internet, it’s little wonder that cyber-criminals have long favored these connections as a target for their operations. Hijacking connections and/or intercepting data streams offers hackers a prime opportunity to extract valuable information assets, siphon off digital financial ones, or to interject … Read More

7 Tell-Tale Warning Signs That You Have Been Hacked

Finjan TeamBlog, Cybersecurity

Finjan 7 Tell Tale Warning Signs That You Have Been Hacked

We hear a lot in the media and around the web about the evils of cyber-crime, and the inevitability of being hacked. But aside from the obvious – like the grandstanding perpetrator of ransomware who greets you on start-up with a grinning skull, and exorbitant demands for BitCoin – how can you tell if you’ve recently (or not so recently) … Read More

Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More

A Survivor’s Guide to Ransomware

Finjan TeamBlog, Cybersecurity

Finjan A Survivors Guide to Ransomware

Each week seems to bring fresh tales of horror from the cyber-security landscape. Email hacks, data breaches, compromised social media platforms – and good old-fashioned malware.  The trending threat of the moment is coming from a new breed of malicious software, known as ransomware. In this guide, we’ll explain what it’s about, and how to protect yourself from it. What … Read More

Browser Security – Tips, Guidelines and Best Practices

Finjan TeamBlog, Cybersecurity

Finjan Browser Security   Tips, Guidelines and Best Practices

For many of us, our first point of contact with the outside world of the internet is a web browser application – a fact that’s known all too well by many an enterprising cyber-criminal. For years, hackers and cyber attackers have been looking for (and finding) weaknesses to exploit in the underlying code, active tool-sets, and associated tools of leading … Read More

Blacklisting vs Whitelisting – Understanding the Security Benefits of Each

Finjan TeamBlog, Cybersecurity

Finjan Blacklisting vs Whitelisting   Understanding the Security Benefits of Each

Guarding individual computer systems and organizational networks from the effects of malicious software or the intrusion of unauthorized users and applications begins with solid perimeter and endpoint defenses, and an effective method of access control. Though opinions differ as to which is best, two approaches dominate in the bid to restrict and regulate access to vital system and network resources … Read More