From innocuous announcements about corporate meetings and social events, social media should be a top ‘care-about’ in the CISO office.
Encapsulating Security Protocol (ESP)
Messages, documents, and files sent via the internet are transmitted in the form of data packets using one or more transfer mechanisms or protocols such as TCP/IP. But how can we ensure that the information received is the authentic material which the originator of the message claims to have sent? That its confidentiality has been preserved along the way? And … Read More
What is Non-Repudiation? A Closer Look at the Principles, Techniques and Best Practices
The “He said, She said” dilemma – where one person claims a certain version of events that’s in partial or complete opposition to the story maintained by another – has been part of human interaction pretty much since the dawn of communication itself. Disputes of this kind are typically resolved through a majority show of faith in one of the … Read More
A Closer Look at the Authentication Header and its Role in Data Transmission and Integrity
Given that one of the preferred methods for spies and cyber-attackers is to intercept a data stream as it moves from its source to its destination, information security practitioners have to focus much of their effort on ensuring the integrity of data in transit. The Authentication Header is an important part of this. What is an Authentication Header? An Authentication … Read More
Spread Spectrum
You’ve doubtless heard about the dangers of WiFi, and the security risks resulting from wireless communications like Bluetooth over unencrypted channels. Though much of the threat in these technologies lies in the fact that information is being transmitted over them in a clear text form that’s easy for hackers to read, another aspect of the danger lies in the nature … Read More
What Businesses Need From a Robust Mobile Device Management Solution?
Like many other companies, Finjan is rolling out a Mobile Device Management (MDM) solution in order to manage enterprise resources on corporate dedicated devices and employee-owned devices. Here’s a closer look at MDM and how we are meeting this business challenge. Mobile Device Management The consumerization of IT has disrupted the business world in a big way. The desktop-dependent lifestyles … Read More
5 Reasons Why You Need a Data Rights Management Policy
The old saying has it that “Time is Money” – but these days, “Information” carries equal weight. If confidential or proprietary data is lost, stolen, or illegally copied, it can have consequences for a business that are just as catastrophic as the collapse of all its investments and the loss of its capital base. That’s why having an effective Data … Read More