The Dangers of MaaS (Malware as a Service)

Finjan TeamBlog, Cybersecurity

Finjan The Dangers of MaaS (Malware as a Service)

Information Technology has become a commodity in its own right. Virtually all aspects of IT are now available as some variant of the “XaaS” family, which includes Software as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and numerous others. They all save time, effort, and money for individuals or enterprise subscribers. And the advantages … Read More

Shift Row Transformation and Other Examples of Advanced Encryption

Finjan TeamBlog, Cybersecurity

Finjan Shift Row Transformation and Other Examples of Advanced Encryption

These days, we’re often warned about the dangers of hacking and data theft, or reminded of the need to protect our vital documents, sensitive information, and credentials by encryption, when they’re transmitted over the internet or an unprotected network. But what does that mean, exactly? Well, in simple terms, encryption is the process of taking a recognizable item (such as … Read More

Finjan Holdings, Inc. – Corporate Overview Video

Finjan TeamAbout Us, Blog

Finjan Finjan Holdings, Inc.   Corporate Overview Video

As a 20 year veteran in cybersecurity, Finjan pioneered behavior-based threat detection. In 2016, Finjan returned to profitability and for the first time as a publicly traded Nasdaq company. Today we are stronger than ever. “Cybersecurity today is a global issue and the increasing complexity of cyberattacks demands new and innovative ways to secure corporate data and protect consumer information,” … Read More

Cybersecurity Risk Assessment – Qualitative vs Quantitative Assessments

Finjan TeamBlog, Cybersecurity

Finjan Cybersecurity Risk Assessment   Qualitative vs Quantitative Assessments

The overall security status of an organization is made up of inputs from the various business units which in turn make up the enterprise – such as Operations, Development, Finance, Audit, and Compliance. One way of establishing the contribution from each department is by assigning it a “risk status” on the basis of cybersecurity risk assessment performed on it over … Read More

The Evolving Role of Artificial Intelligence in Cybersecurity

Finjan TeamBlog, Cybersecurity

Finjan The Evolving Role of Artificial Intelligence in Cybersecurity

It’s often been observed that technological advancement is a double-edged sword – and this is especially true in the realm of cybersecurity. Attackers have been known to use automation technology to stage and sustain their strikes – while those same machine learning algorithms and real-time response mechanisms can help enterprises that suffer an assault to speed up their efforts at … Read More

Anatomy of a TCP Sequence Prediction Attack

Finjan TeamBlog, Cybersecurity

Finjan Anatomy of a TCP Sequence Prediction Attack

With so much of our business and personal lives relying on the transfer of information between points on the internet, it’s little wonder that cyber-criminals have long favored these connections as a target for their operations. Hijacking connections and/or intercepting data streams offers hackers a prime opportunity to extract valuable information assets, siphon off digital financial ones, or to interject … Read More

7 Tell-Tale Warning Signs That You Have Been Hacked

Finjan TeamBlog, Cybersecurity

Finjan 7 Tell Tale Warning Signs That You Have Been Hacked

We hear a lot in the media and around the web about the evils of cyber-crime, and the inevitability of being hacked. But aside from the obvious – like the grandstanding perpetrator of ransomware who greets you on start-up with a grinning skull, and exorbitant demands for BitCoin – how can you tell if you’ve recently (or not so recently) … Read More

Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More

A Survivor’s Guide to Ransomware

Finjan TeamBlog, Cybersecurity

Finjan A Survivors Guide to Ransomware

Each week seems to bring fresh tales of horror from the cyber-security landscape. Email hacks, data breaches, compromised social media platforms – and good old-fashioned malware.  The trending threat of the moment is coming from a new breed of malicious software, known as ransomware. In this guide, we’ll explain what it’s about, and how to protect yourself from it. What … Read More