What is Digital Transformation’s Impact on Cybersecurity?

Finjan TeamBlog, Cybersecurity

Finjan What is Digital Transformations Impact on Cybersecurity?

What is the relationship between digital transformation and cybersecurity? Is cybersecurity helping or hindering the acceleration of digital transformation? Are the two topics related, or are they merely orthogonal, in the modern enterprise? Let’s start at the beginning. The term ‘digital transformation’, often referred to a simple DX, likely sounds familiar because it has been widely used since the 1990s. … Read More

Why Can’t Network Security Get Ahead of the Bad Guys?

Finjan TeamBlog, Cybersecurity, Network Security

Finjan Why Cant Network Security Get Ahead of the Bad Guys?

Cybersecurity has always been a concern, dating back to the mid-1990s when PCs and the Internet were first widely available to enterprise users and consumers. Now, some 25+ years later cybersecurity is a huge and necessary industry. Gartner forecasts that worldwide spending on information security products and services will reach more than $124 billion in 2019. That’s an increase of … Read More

Is it time for “GDPR” in the United States?

Finjan TeamBlog, Cybersecurity

Finjan Is it time for GDPR in the United States?

Concerns about data privacy and security have never been higher in the United States. With the steady stream of news regarding data breaches and theft, anxiety and a feeling of helplessness are commonplace. A 2018 survey of 10,000 consumers, conducted by the Harris Poll revealed that 78 percent of U.S. respondents say a company’s ability to keep their data private … Read More

Safari Malware – A Closer Look at Malicious Software that Preys on Apple’s Mac OS-X and iOS

Finjan TeamBlog, Cybersecurity

Finjan Safari Malware – A Closer Look at Malicious Software that Preys on Apples Mac OS X and iOS

Apple’s Mac OS-X and iOS operating systems have traditionally been highly resistant to malware, leaving bad actors to concentrate their efforts on infecting individual components of a desktop, such as the Safari web browser. For years, the prevailing wisdom has been that Apple hardware or software simply can’t be infected by viruses or other malicious software – a view that … Read More

The Use of Blockchain in Healthcare – How Can Technology Keep Health Data Secure and Private?

Finjan TeamBlog, Cybersecurity

Finjan The Use of Blockchain in Healthcare   How Can Technology Keep Health Data Secure and Private?

Blockchain technology is being proposed as a means of preserving the integrity and confidentiality of stakeholder information in the health sector. Individuals and organizations in the healthcare industry are making increasing use of the cloud, to cut down on management costs and data access times. This comes at a potential cost in data security, if cloud services are poorly delivered … Read More

How Companies Will Handle Social Media eDiscovery

Finjan TeamBlog, Cybersecurity

Finjan How Companies Will Handle Social Media eDiscovery

Enterprise eDiscovery now has to factor social media into its makeup. Facebook, Twitter, Instagram, and other social platforms contribute on a daily basis to the enterprise data stream. And when that information is called for in a legal context, organizations must have appropriate measures in place to comply with requests for access. These measures, in turn, have to cover the … Read More

Why Tech Companies Are Resistant to Adding Backdoors

Finjan TeamBlog, Cybersecurity

Finjan Why Tech Companies Are Resistant to Adding Backdoors

So-called “backdoors” built into application software, hardware, and operating systems can be the breaking point for end-to-end and device-based encryption, access controls, and other security measures put in place to protect desktop and mobile devices. And they’re a mechanism that government and law enforcement agencies across the globe are putting increasing pressure on manufacturers, vendors, and online service providers to … Read More

How Will Anti-Encryption Laws Affect Users?

Finjan TeamBlog, Cybersecurity

Finjan How Will Anti Encryption Laws Affect Users?

The increasing reliance by consumers worldwide on encrypted messaging platforms, Virtual Private Networks (VPNs), and data protection algorithms at personal and business levels has prompted a backlash from several governments, in the form of draft legislation and some currently active sets of anti-encryption laws. It’s claimed that these statutes are being proposed in the public interest, as the same sets … Read More

How Dangerous Are Potentially Unwanted Applications or PUA’s?

Finjan TeamBlog, Cybersecurity

Finjan How Dangerous Are Potentially Unwanted Applications or PUA’s?

Corporate employees or private users whose systems or devices come with pre-installed software usually aren’t concerned with knowing exactly what programs they have, as long as they can do their jobs or use their hardware without any complications. But if your system contains or installs pre-packaged or bundled software, it may be at risk from Potentially Unwanted Applications. What Are … Read More