5 Things CISOs Should Consider Now to Secure the Edge

Finjan TeamBlog, Edge, Network Security

Finjan 5 Things CISOs Should Consider Now to Secure the Edge

The Edge is on everyone’s mind. It is impossible to pick up any computing or networking trade publication and not read about the edge. Why all the buzz? Edge computing allows data that is generated close to users and endpoints (IoT devices, sensors, factory equipment, autonomous cars, etc.) to be processed close to those users and endpoints. Edge computing minimizes … Read More

Why Can’t Network Security Get Ahead of the Bad Guys?

Finjan TeamBlog, Cybersecurity, Network Security

Finjan Why Cant Network Security Get Ahead of the Bad Guys?

Cybersecurity has always been a concern, dating back to the mid-1990s when PCs and the Internet were first widely available to enterprise users and consumers. Now, some 25+ years later cybersecurity is a huge and necessary industry. Gartner forecasts that worldwide spending on information security products and services will reach more than $124 billion in 2019. That’s an increase of … Read More

MAC (Media Access Control)

Finjan TeamBlog, Network Security

Finjan MAC (Media Access Control)

Telecommunications and old-school postal systems use a hierarchy of identifying characteristics (number, exchange, zip or area code, state or country code, etc.) to break the process of transmitting messages into manageable steps, each of which may be handled by mechanisms appropriate to a given stage (mailbox, local sorting office, etc.). The same holds true for network and internet communications, where … Read More

A Closer Look at Sniffing (aka Packet Sniffing)

Finjan TeamBlog, Network Security

Finjan A Closer Look at Sniffing (aka Packet Sniffing)

In the realm of cyber-security, it’s sometimes the case that what works as a defense or deterrent in preserving the integrity of computer networks may also be turned against them as a weapon. This is certainly true of sniffing. What is Sniffing? Sniffing (or packet sniffing) is the process of capturing packets of data as they flow across a computer … Read More

Simple Network Management Protocols (SNMP)

Finjan TeamBlog, Network Security

Finjan Simple Network Management Protocols (SNMP)

Network administrators and Information Security Officers (ISOs) have a tough job monitoring and marshaling the resources of corporate infrastructure – especially at a time when enterprises are expanding their operations beyond localized data centers and campuses to dispersed networks having the potential to span the globe. Fortunately, there’s a standardized set of mechanisms that can streamline and rationalize network management … Read More

Network Security Objectives and Attack Modes

Finjan TeamBlog, Network Security

Finjan Network Security Objectives and Attack Modes

A network exists when two or more computing systems are linked in a mutually dependent relationship that enables them to share resources and/or information. The connection between systems may be a physical one – as is the case with a traditional private data center, where banks of servers and systems are connected by cables, routers, and switches. It may also … Read More