The Importance of Digital Forensics

Finjan TeamBlog, Cybersecurity

Finjan The Importance of Digital Forensics

Just as in the physical world, we leave traces of ourselves – fingerprints, hairs, clothing fibers, DNA, etc. – when we move and interact with people, places, and objects, so too do activities in the digital realm leave pieces or echoes of themselves. These virtual or digital traces – think file fragments, activity logs, timestamps, metadata, and so on – … Read More

The Evolving Role of Artificial Intelligence in Cybersecurity

Finjan TeamBlog, Cybersecurity

Finjan The Evolving Role of Artificial Intelligence in Cybersecurity

It’s often been observed that technological advancement is a double-edged sword – and this is especially true in the realm of cybersecurity. Attackers have been known to use automation technology to stage and sustain their strikes – while those same machine learning algorithms and real-time response mechanisms can help enterprises that suffer an assault to speed up their efforts at … Read More

7 Tell-Tale Warning Signs That You Have Been Hacked

Finjan TeamBlog, Cybersecurity

Finjan 7 Tell Tale Warning Signs That You Have Been Hacked

We hear a lot in the media and around the web about the evils of cyber-crime, and the inevitability of being hacked. But aside from the obvious – like the grandstanding perpetrator of ransomware who greets you on start-up with a grinning skull, and exorbitant demands for BitCoin – how can you tell if you’ve recently (or not so recently) … Read More

Birthday Paradox – When Mathematical Theory is Used in Cyber Attacks

Finjan TeamBlog, Cybersecurity

Finjan Birthday Paradox   When Mathematical Theory is Used in Cyber Attacks

Mathematical permutations and statistical probabilities frequently pose a problem for befuddled high school students, struggling to cope with repetitive calculations and weird symbols. This often occurs because, behind the figures, there’s an underlying logic (which often seems to be anything but logical) that makes what appears on the surface to be an obvious situation or conclusion actually seem anything but. … Read More

Egress Monitoring

Finjan TeamBlog, Cybersecurity

Finjan Egress Monitoring

With so many threats looming from intruders and malicious software originating outside of systems and corporate LANs, it’s easy to overlook the fact that security lapses and vulnerabilities can equally emanate from within a connected system or private network, and make their way out to cause damage as well. So for comprehensive security coverage, it’s essential not only to have … Read More

Password Attacks – How They Occur and How to Guard Against Them

Finjan TeamBlog, Cybersecurity

Finjan Password Attacks   How They Occur and How to Guard Against Them

Passwords can be difficult to remember, especially if you follow the rules to make them “strong”. They can also be fiddly to input, especially on mobile devices and small keyboards, and inconvenient and time-consuming to use considering it’s best practice to use different ones for each account. However, if a hacker determines or gains access to your security passwords, you … Read More

Application Layer Security and the OSI Model

Finjan TeamBlog, Cybersecurity

Finjan Application Layer Security and the OSI Model

In an increasingly treacherous cyber-security landscape – and with corporate networks expanding beyond desktops and on-site data centers to include cloud connections and remote and mobile workers – enterprise software presents cyber-criminals and hackers with potential opportunities to steal information and cause damage or distress. This highlights the need for security to extend to both the network and the software … Read More

Smart Card Attacks – A Look at How Hardware Tokens are Being Exploited

Finjan TeamBlog, Cybersecurity

Finjan Smart Card Attacks   A Look at How Hardware Tokens are Being Exploited

With their embedded microchip technology and the secure authentication they can provide, smart cards or hardware tokens have been relied upon to give physical access and the go-ahead for data transfer in a multitude of applications and transactions, in the public, corporate, and government sectors. But, robust as they are, smart cards do have weaknesses – and intelligent hackers have … Read More

Advanced Sandboxing in the Fight Against Cyber Threats

Finjan TeamBlog, Cybersecurity

Finjan Advanced Sandboxing in the Fight Against Cyber Threats

Some recent estimates are putting the hacking industry at three to five times the size of the market for cyber-security. So it’s fair to say that this is a profitable time to be a cybercriminal – and a productive one, too. With multitudes of files, email messages (and more importantly, email attachments) moving between individuals and organizations every day, there’s … Read More