The Benefits of Real-Time Cyber Threat Intelligence

Finjan TeamBlog, Cybersecurity

Finjan The Benefits of Real Time Cyber Threat Intelligence

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air, or identified and adopted without knowledge of what they are, how they should be used, and … Read More

Healthcare Data Breaches – A Common Problem and a Real Threat

Finjan TeamBlog, Cybersecurity

Finjan Healthcare Data Breaches   A Common Problem and a Real Threat

As a safeguard for patients’ personal or financial data, to protect the integrity of pharmaceutical products and medical processes, and for various other reasons, organizations operating in the healthcare sector are required to comply with conditions set out by legal frameworks such as the Health Insurance Portability and Accountability Act (HIPAA). These provide recommendations and regulatory compliance demands which are … Read More

Cyber Threats – How the Public is at Risk from Cyberattack

Finjan TeamBlog, Cybersecurity

Finjan Cyber Threats   How the Public is at Risk from Cyberattack

Given the number of media reports on high-profile cyber-attacks involving well-known brand names, organizations, or celebrities, you might be forgiven for assuming that only huge corporations or the rich and famous are targeted for cyber-crime attacks. But this is a dangerous assumption to make – one that can lead “ordinary” citizens to become dismissive or complacent, when it comes to … Read More

TCP Starvation

Finjan TeamBlog, Cybersecurity

Finjan TCP Starvation

Since information has become the life’s blood and major currency of the digital economy, it’s essential that measures should be taken to ensure that data flows smoothly between those who create it, and those who are meant to receive it. This is particularly true of the internet, which is the world’s major transport medium for digital information and content of … Read More

How GDPR Will Benefit Large American Tech Companies

Finjan TeamBlog, Cybersecurity

Finjan How GDPR Will Benefit Large American Tech Companies

The General Data Protection Regulation or GDPR (Regulation (EU) 2016/679) was created by lawmakers in the European Union (EU) as a means of strengthening privacy protection and upholding the rights to personal information of consumers in the European continent. There’s a lot of speculation – and a fair amount of scrambling to get things put in place – as the … Read More

Smartphone Data Tracking

Finjan TeamBlog, Cybersecurity

Finjan Smartphone Data Tracking

If you’re a smartphone user, you’ll probably find that the little mobile device not only remains with you for the larger part of each day but that it also plays some kind of a role in practically every aspect of your daily life. Whether that simply means checking the time or checking in with your social media and messaging services … Read More

KRACK Wi-Fi Vulnerability

Finjan TeamBlog, Cybersecurity

Finjan KRACK Wi Fi Vulnerability

Accepted as the current standard for the secure encryption of Wi-Fi networks, Wi-Fi Protected Access 2 or WPA2 has for some time been the automatic choice for users wishing to set up a wireless access point that’s free from the threat of eavesdroppers. But as with all things in the digital realm, evolving methods and technologies can and do conspire … Read More

Direct Sequence Spread Spectrum

Finjan TeamBlog, Cybersecurity

Finjan Direct Sequence Spread Spectrum

In conventional wireless communications, transmission typically occurs at a set frequency – and if an eavesdropper can determine what that frequency is, then it’s a fairly simple task for them to intercept the data stream, or disrupt it in some way. Military engineers have long understood this principle, and the possibilities it presents for compromising vital missions and operational security. … Read More

Unicast, Broadcast, Multicast Data Transmission – Key Differences, Benefits and Drawbacks

Finjan TeamBlog, Cybersecurity

Finjan Unicast, Broadcast, Multicast Data Transmission   Key Differences, Benefits and Drawbacks

With the internet and digital technology blurring the boundaries between content, communication, and media types, these days you’re just as likely to tune into a concert, movie, or television show on your mobile phone, as you are to catch the same event on radio, at a cinema, or through your home entertainment system. This transition may appear seamless, but behind … Read More

IDaaS (Identity as a Service) – A Single Sign-on Service for the Cloud

Finjan TeamBlog, Cybersecurity

Finjan IDaaS (Identity as a Service)   A Single Sign on Service for the Cloud

The technology of the cloud makes it possible to vastly expand the reach and capabilities of individuals and organizations – through its ability to boost computing and storage capacity through the use of multiple remote servers, the potential to combine infrastructure, software, and services, and the power to provide access to potentially global pools of talent, money, and resources. This … Read More