Cyber Threats – How the Public is at Risk from Cyberattack

Finjan TeamBlog, Cybersecurity

Finjan Cyber Threats   How the Public is at Risk from Cyberattack

Given the number of media reports on high-profile cyber-attacks involving well-known brand names, organizations, or celebrities, you might be forgiven for assuming that only huge corporations or the rich and famous are targeted for cyber-crime attacks. But this is a dangerous assumption to make – one that can lead “ordinary” citizens to become dismissive or complacent, when it comes to … Read More

Top 5 Cybersecurity Mistakes That Make Life Easy for Cyber-criminals

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Cybersecurity Mistakes That Make Life Easy for Cyber criminals

Though high-profile assaults on huge corporations or well-known web platforms grab the most attention when they make the news, cyber-criminals are at work at all levels – from attacks on private individuals, to attempts made on businesses and organizations of all types and sizes. In recent times, they’ve met with increasing success, resulting in huge personal and corporate losses in … Read More

TCP Starvation

Finjan TeamBlog, Cybersecurity

Finjan TCP Starvation

Since information has become the life’s blood and major currency of the digital economy, it’s essential that measures should be taken to ensure that data flows smoothly between those who create it, and those who are meant to receive it. This is particularly true of the internet, which is the world’s major transport medium for digital information and content of … Read More

How GDPR Will Benefit Large American Tech Companies

Finjan TeamBlog, Cybersecurity

Finjan How GDPR Will Benefit Large American Tech Companies

The General Data Protection Regulation or GDPR (Regulation (EU) 2016/679) was created by lawmakers in the European Union (EU) as a means of strengthening privacy protection and upholding the rights to personal information of consumers in the European continent. There’s a lot of speculation – and a fair amount of scrambling to get things put in place – as the … Read More

Smartphone Data Tracking

Finjan TeamBlog, Cybersecurity

Finjan Smartphone Data Tracking

If you’re a smartphone user, you’ll probably find that the little mobile device not only remains with you for the larger part of each day but that it also plays some kind of a role in practically every aspect of your daily life. Whether that simply means checking the time or checking in with your social media and messaging services … Read More

Car Companies and Big Data – How Smart Cars Collect Your Data

Finjan TeamBlog, Cybersecurity

Finjan Car Companies and Big Data   How Smart Cars Collect Your Data

Gone are the days when vehicular transport simply meant four wheels, an internal combustion engine, two or more doors, and a solid roof (if you were lucky). Cars, trucks, and buses of the digital age typically carry around 40 microprocessors and dozens of electronic sensors to regulate their functions and monitor performance. And like other mechanisms and appliances which incorporate … Read More

Spectre and Meltdown

Finjan TeamBlog, Cybersecurity

Finjan Spectre and Meltdown

2018 has just begun – and already we’ve seen the year’s first major cyber-security crisis. It concerns two vulnerabilities with the capacity to affect the majority of computers, smartphones, laptops, and tablets developed since 2011 – and it’s got individual citizens and businesses (including some of the world’s most heavyweight commercial organizations) scrambling to make sense of the issues, and … Read More

Benefits of Companies Taking Out Cybersecurity Insurance

Finjan TeamBlog, Cybersecurity

Finjan Benefits of Companies Taking Out Cybersecurity Insurance

Security and business IT professionals are pretty much in agreement that it’s impossible for commercial organizations to completely avoid being hit by some form of cyber-attack or security breach – either as a future event or an incident that’s already occurred. While planning, policy-making, and the deployment of security mechanisms, devices, and protocols may offer some relief, the inevitability of … Read More

What is a Zero Trust Network?

Finjan TeamBlog, Cybersecurity

Finjan What is a Zero Trust Network?

The traditional model of network security relies on the establishment of a secure boundary, or perimeter. This not only keeps unwanted “visitors” or attackers out but also assumes that those who remain within the boundary are only authorized users of the system. These authorized users may then be trusted only to access the network resources that have been allocated to … Read More

The Importance of Digital Forensics

Finjan TeamBlog, Cybersecurity

Finjan The Importance of Digital Forensics

Just as in the physical world, we leave traces of ourselves – fingerprints, hairs, clothing fibers, DNA, etc. – when we move and interact with people, places, and objects, so too do activities in the digital realm leave pieces or echoes of themselves. These virtual or digital traces – think file fragments, activity logs, timestamps, metadata, and so on – … Read More