From innocuous announcements about corporate meetings and social events, social media should be a top ‘care-about’ in the CISO office.
Messages, documents, and files sent via the internet are transmitted in the form of data packets using one or more transfer mechanisms or protocols such as TCP/IP. But how can we ensure that the information received is the authentic material which the originator of the message claims to have sent? That its confidentiality has been preserved along the way? And … Read More
The “He said, She said” dilemma – where one person claims a certain version of events that’s in partial or complete opposition to the story maintained by another – has been part of human interaction pretty much since the dawn of communication itself. Disputes of this kind are typically resolved through a majority show of faith in one of the … Read More
Given that one of the preferred methods for spies and cyber-attackers is to intercept a data stream as it moves from its source to its destination, information security practitioners have to focus much of their effort on ensuring the integrity of data in transit. The Authentication Header is an important part of this. What is an Authentication Header? An Authentication … Read More
You’ve doubtless heard about the dangers of WiFi, and the security risks resulting from wireless communications like Bluetooth over unencrypted channels. Though much of the threat in these technologies lies in the fact that information is being transmitted over them in a clear text form that’s easy for hackers to read, another aspect of the danger lies in the nature … Read More
Like many other companies, Finjan is rolling out a Mobile Device Management (MDM) solution in order to manage enterprise resources on corporate dedicated devices and employee-owned devices. Here’s a closer look at MDM and how we are meeting this business challenge. Mobile Device Management The consumerization of IT has disrupted the business world in a big way. The desktop-dependent lifestyles … Read More
The old saying has it that “Time is Money” – but these days, “Information” carries equal weight. If confidential or proprietary data is lost, stolen, or illegally copied, it can have consequences for a business that are just as catastrophic as the collapse of all its investments and the loss of its capital base. That’s why having an effective Data … Read More