5G wireless networks are rolling out and early trials are underway by major carriers. Though you may not be personally impacted for another year or two, 5G will have a big, positive impact on you and is a huge technology shift. This upgrade to a ‘5th generation’ wireless infrastructure has game-changing implications on mobile networks that carry data for all … Read More
Advances in Network Security via AI and Machine Learning
In a recent Finjan blog ‘Why Can’t Network Security Get Ahead of the Bad Guys?’, we wrote about the difficulty of staying ahead of hackers and attackers. To help address this issue, one industry bright spot is the application of Artificial Intelligence (AI) and Machine Learning (ML) to provide a programmatic approach to building and maintaining improved cybersecurity. In this … Read More
What Can a CISO do to Mitigate Social Media Risks?
From innocuous announcements about corporate meetings and social events, social media should be a top ‘care-about’ in the CISO office.
What is Digital Transformation’s Impact on Cybersecurity?
What is the relationship between digital transformation and cybersecurity? Is cybersecurity helping or hindering the acceleration of digital transformation? Are the two topics related, or are they merely orthogonal, in the modern enterprise? Let’s start at the beginning. The term ‘digital transformation’, often referred to a simple DX, likely sounds familiar because it has been widely used since the 1990s. … Read More
5 Things CISOs Should Consider Now to Secure the Edge
The Edge is on everyone’s mind. It is impossible to pick up any computing or networking trade publication and not read about the edge. Why all the buzz? Edge computing allows data that is generated close to users and endpoints (IoT devices, sensors, factory equipment, autonomous cars, etc.) to be processed close to those users and endpoints. Edge computing minimizes … Read More
Why Can’t Network Security Get Ahead of the Bad Guys?
Cybersecurity has always been a concern, dating back to the mid-1990s when PCs and the Internet were first widely available to enterprise users and consumers. Now, some 25+ years later cybersecurity is a huge and necessary industry. Gartner forecasts that worldwide spending on information security products and services will reach more than $124 billion in 2019. That’s an increase of … Read More
Is it time for “GDPR” in the United States?
Concerns about data privacy and security have never been higher in the United States. With the steady stream of news regarding data breaches and theft, anxiety and a feeling of helplessness are commonplace. A 2018 survey of 10,000 consumers, conducted by the Harris Poll revealed that 78 percent of U.S. respondents say a company’s ability to keep their data private … Read More
Securing IT in an Open Source Dominated World
IT has always been the forefront of innovation and disruption. But just a few years ago, not many would have predicted that Open Source software would have the tectonic and omnipresent impact that it does today. Pervasive use of open source within organizations has created new challenges for the teams chartered with ensuring enterprises are both secure and compliant. … Read More
Do Patents Stimulate or Stifle Innovation?
Economic research indicates that innovation is central to economic growth. But what role do patents play in motivating or suppressing innovation itself? It is an ongoing debate, and there are plenty of passionate opinions amongst legal scholars, economists, entrepreneurs and industry titans to make your head spin. Given Finjan’s global leadership in the cybersecurity technology sector and our strong portfolio … Read More
Safari Malware – A Closer Look at Malicious Software that Preys on Apple’s Mac OS-X and iOS
Apple’s Mac OS-X and iOS operating systems have traditionally been highly resistant to malware, leaving bad actors to concentrate their efforts on infecting individual components of a desktop, such as the Safari web browser. For years, the prevailing wisdom has been that Apple hardware or software simply can’t be infected by viruses or other malicious software – a view that … Read More