PTAB refuses to institute harassing IPR challenges against Finjan

Gene QuinnBlog

Finjan PTAB refuses to institute harassing IPR challenges against Finjan

Recently the Patent Trial and Appeal Board (Board) at the United States Patent and Trademark Office (USPTO) denied institution in two separate inter partes review (IPR) challenges. IPR2016-01441 (relating to U.S. Patent No. 8,225,408) and IPR2016-01443 (relating to U.S. Patent No. 8,677,494). Both IPR petitions were filed by Blue Coat Systems, LLC, against Finjan, Inc. In both instances the Board … Read More

Spread Spectrum

Finjan TeamBlog, data security

Finjan Spread Spectrum

You’ve doubtless heard about the dangers of WiFi, and the security risks resulting from wireless communications like Bluetooth over unencrypted channels. Though much of the threat in these technologies lies in the fact that information is being transmitted over them in a clear text form that’s easy for hackers to read, another aspect of the danger lies in the nature … Read More

A Closer Look at Sniffing (aka Packet Sniffing)

Finjan TeamBlog, Network Security

Finjan A Closer Look at Sniffing (aka Packet Sniffing)

In the realm of cyber-security, it’s sometimes the case that what works as a defense or deterrent in preserving the integrity of computer networks may also be turned against them as a weapon. This is certainly true of sniffing. What is Sniffing? Sniffing (or packet sniffing) is the process of capturing packets of data as they flow across a computer … Read More

Simple Network Management Protocols (SNMP)

Finjan TeamBlog, Network Security

Finjan Simple Network Management Protocols (SNMP)

Network administrators and Information Security Officers (ISOs) have a tough job monitoring and marshaling the resources of corporate infrastructure – especially at a time when enterprises are expanding their operations beyond localized data centers and campuses to dispersed networks having the potential to span the globe. Fortunately, there’s a standardized set of mechanisms that can streamline and rationalize network management … Read More

The Non-Interference Model

Finjan TeamBlog, Cybersecurity

Finjan The Non Interference Model

Security models of control are used as a way of formalizing a security policy. They determine in one way or another how security will be implemented across a system or network, which subjects are permitted access to the system, and which objects they are allowed access to. These security models are typically put in place by enforcing confidentiality, integrity, or … Read More

Trusted Computing Base or “TCB”

Finjan TeamBlog, Cybersecurity

Finjan Trusted Computing Base or TCB

As well as an infrastructure of components and processes, a computer system also requires a security architecture defining its capacity to resist attacks and attempts at infiltration and providing its capability to detect and respond to threats and changing conditions. With susceptibility to attack being as critical a factor to system stability as the potential failure of its component parts, … Read More

Common Criteria for Information Technology Security Evaluation

Finjan TeamBlog, Cybersecurity

Finjan Common Criteria for Information Technology Security Evaluation

The need to ensure that consumers have access to IT products which are inherently secure has raised a demand for some kind of internationally recognized standard for evaluating and certifying equipment and software. Such a standard exists in what’s collectively known as the Common Criteria or CC. Common Criteria or CC More formally known as the “Common Criteria for Information … Read More

Network Security Objectives and Attack Modes

Finjan TeamBlog, Network Security

Finjan Network Security Objectives and Attack Modes

A network exists when two or more computing systems are linked in a mutually dependent relationship that enables them to share resources and/or information. The connection between systems may be a physical one – as is the case with a traditional private data center, where banks of servers and systems are connected by cables, routers, and switches. It may also … Read More

Border Gateway Protocol

Finjan TeamBlog, Internet Security

Finjan Border Gateway Protocol

With the increasing integration of cloud-based telecommunications and data transmission over the internet, there’s a need for different corporate and private networks to interact with each other. To preserve data integrity and to ease the flow of information, it’s essential to have standardized pathways and rules to govern this interchange. One of these is the Border Gateway Protocol or BGP. … Read More

Biba Integrity Model

Finjan TeamBlog, Cybersecurity

Finjan Biba Integrity Model

Confidentiality, integrity, and availability make up the “security triad” as it applies to data. And one of the principal security models dedicated to preserving the integrity of information is the Biba integrity model, which we’ll be looking at today. Biba Integrity Model – Some History For years, matters of data confidentiality were largely dealt with by the Bell-LaPadula model, which … Read More