Password Attacks – How They Occur and How to Guard Against Them

Finjan TeamBlog, Cybersecurity

Finjan Password Attacks   How They Occur and How to Guard Against Them

Passwords can be difficult to remember, especially if you follow the rules to make them “strong”. They can also be fiddly to input, especially on mobile devices and small keyboards, and inconvenient and time-consuming to use considering it’s best practice to use different ones for each account. However, if a hacker determines or gains access to your security passwords, you … Read More

A Closer Look at CMM – Software Capability Maturity Model

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at CMM   Software Capability Maturity Model

With software being the potentially lucrative but often cut-throat business that it is, it makes sense for organizations to establish robust and repeatable techniques and processes for developing applications that consistently maintain a high standard of usability, reliability, and integrity. One method of ensuring this is by using the Capability Maturity Model or CMM. The Origins of the Capability Maturity … Read More

Finjan CEO, Phil Hartstein, Selected as one of IAM’s Elite IP Deal Makers

Finjan TeamBlog, Finjan News

Finjan Finjan CEO, Phil Hartstein, Selected as one of IAM’s Elite IP Deal Makers

Intellectual Asset Management (IAM) recently published their annual list of elite IP deal makers, titled “Meet the world’s elite IP deal makers” IAM November/December 2016. This list was started just two years ago where it featured “the most influential [individuals] in driving the global IP transactions market” from mostly US companies. This year’s list is more comprehensive reflecting the ongoing … Read More

Application Layer Security and the OSI Model

Finjan TeamBlog, Cybersecurity

Finjan Application Layer Security and the OSI Model

In an increasingly treacherous cyber-security landscape – and with corporate networks expanding beyond desktops and on-site data centers to include cloud connections and remote and mobile workers – enterprise software presents cyber-criminals and hackers with potential opportunities to steal information and cause damage or distress. This highlights the need for security to extend to both the network and the software … Read More

Substitution Ciphers – A Look at the Origins and Applications of Cryptography

Finjan TeamBlog, Cybersecurity

Finjan Substitution Ciphers   A Look at the Origins and Applications of Cryptography

We may have gotten used to thinking of encryption as a modern-day digital phenomenon. But humans have been sending coded transmissions in one form or another, pretty much since language was invented. One of the most widely used forms of early cryptography was the substitution cipher. What are Substitution Ciphers? A substitution cipher is a method of cryptography (the science … Read More

Smart Card Attacks – A Look at How Hardware Tokens are Being Exploited

Finjan TeamBlog, Cybersecurity

Finjan Smart Card Attacks   A Look at How Hardware Tokens are Being Exploited

With their embedded microchip technology and the secure authentication they can provide, smart cards or hardware tokens have been relied upon to give physical access and the go-ahead for data transfer in a multitude of applications and transactions, in the public, corporate, and government sectors. But, robust as they are, smart cards do have weaknesses – and intelligent hackers have … Read More

Access Control Systems – A Closer Look at the Bell-LaPadula Model

Finjan TeamBlog, Cybersecurity

Finjan Access Control  Systems   A Closer Look at the Bell LaPadula Model

While controlling user access to protected networks and sensitive data is important in the private sector, it’s crucial to maintaining security in government and military circles. So much so that a specific protocol was adopted for these applications. Known as the multi-level or Bell-LaPadula Model (BLM, or sometimes BLP), this access control system forms the basis of our discussion today. … Read More

Symmetric Versus Asymmetric Encryption

Finjan TeamBlog, Cybersecurity

Finjan Symmetric Versus Asymmetric Encryption

In the face of threats like data tampering, snooping, and identity theft, individuals and organizations require some means to ensure the safety of information that’s transmitted through private networks and over public channels. Encryption is one way of achieving this. On the surface, it sounds like a simple process: Take a message or document, scramble it, send it, and provide … Read More

Advanced Sandboxing in the Fight Against Cyber Threats

Finjan TeamBlog, Cybersecurity

Finjan Advanced Sandboxing in the Fight Against Cyber Threats

Some recent estimates are putting the hacking industry at three to five times the size of the market for cyber-security. So it’s fair to say that this is a profitable time to be a cybercriminal – and a productive one, too. With multitudes of files, email messages (and more importantly, email attachments) moving between individuals and organizations every day, there’s … Read More