The Benefits of Real-Time Cyber Threat Intelligence

Finjan TeamBlog, Cybersecurity

Finjan The Benefits of Real Time Cyber Threat Intelligence

To protect their personnel, assets, and sensitive information from being compromised, hijacked, or stolen by malicious actors, organizations are often advised to adopt security best practices, and to deploy the latest in secure technologies. But these things can’t be pulled out of thin air, or identified and adopted without knowledge of what they are, how they should be used, and … Read More

How will GDPR Affect Social Media Marketing?

Finjan TeamBlog, Cybersecurity

Finjan How will GDPR Affect Social Media Marketing?

The May 25th, 2018 deadline for its formal introduction has passed and organizations across the globe are scrambling frantically to ensure that they’re prepared to meet the demanding terms of the European Union’s (EU’s) General Data Protection Regulation or GDPR. It’s a legal and compliance framework designed to safeguard the privacy and data rights of EU citizens and residents – … Read More

Healthcare Data Breaches – A Common Problem and a Real Threat

Finjan TeamBlog, Cybersecurity

Finjan Healthcare Data Breaches   A Common Problem and a Real Threat

As a safeguard for patients’ personal or financial data, to protect the integrity of pharmaceutical products and medical processes, and for various other reasons, organizations operating in the healthcare sector are required to comply with conditions set out by legal frameworks such as the Health Insurance Portability and Accountability Act (HIPAA). These provide recommendations and regulatory compliance demands which are … Read More

Top 5 Cybersecurity Mistakes That Make Life Easy for Cyber-criminals

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Cybersecurity Mistakes That Make Life Easy for Cyber criminals

Though high-profile assaults on huge corporations or well-known web platforms grab the most attention when they make the news, cyber-criminals are at work at all levels – from attacks on private individuals, to attempts made on businesses and organizations of all types and sizes. In recent times, they’ve met with increasing success, resulting in huge personal and corporate losses in … Read More

Smartphone Data Tracking

Finjan TeamBlog, Cybersecurity

Finjan Smartphone Data Tracking

If you’re a smartphone user, you’ll probably find that the little mobile device not only remains with you for the larger part of each day but that it also plays some kind of a role in practically every aspect of your daily life. Whether that simply means checking the time or checking in with your social media and messaging services … Read More

Hardware Encryption – How is the Market Emerging?

Finjan TeamBlog, Cybersecurity

Finjan Hardware Encryption – How is the Market Emerging?

Privacy and information security concerns have fueled the increased usage in recent years of data encryption. Much of the focus of this activity – and most of the forms in which the related technology has been distributed and implemented – has been on desktop software, mobile applications, and network/system processes. But hardware-based encryption methods and technologies do exist – and … Read More

Direct Sequence Spread Spectrum

Finjan TeamBlog, Cybersecurity

Finjan Direct Sequence Spread Spectrum

In conventional wireless communications, transmission typically occurs at a set frequency – and if an eavesdropper can determine what that frequency is, then it’s a fairly simple task for them to intercept the data stream, or disrupt it in some way. Military engineers have long understood this principle, and the possibilities it presents for compromising vital missions and operational security. … Read More

IDaaS (Identity as a Service) – A Single Sign-on Service for the Cloud

Finjan TeamBlog, Cybersecurity

Finjan IDaaS (Identity as a Service)   A Single Sign on Service for the Cloud

The technology of the cloud makes it possible to vastly expand the reach and capabilities of individuals and organizations – through its ability to boost computing and storage capacity through the use of multiple remote servers, the potential to combine infrastructure, software, and services, and the power to provide access to potentially global pools of talent, money, and resources. This … Read More

The Origins of Kerckhoff’s Principle and How it is Used in Encryption Today

Finjan TeamBlog, Cybersecurity

Finjan The Origins of Kerckhoffs Principle and How it is Used in Encryption Today

In this era of disclosure, transparency, and the public internet, maintaining exclusive rights or control over knowledge and techniques is a virtual impossibility. Any measures put in place to safeguard the transfer and storage of information have to contend not only with external threats, but also with the intervention of higher authorities (as in the case of investigations by government … Read More

Identity Access Management – How It Is Used to Protect the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Identity Access Management   How It Is Used to Protect the Enterprise

With advances in technology and the growth of the digital economy, enterprise computer networks have expanded beyond the in-house data center to include wireless and mobile applications and networks, and to embrace the internet at large. Good business practice and the demands of regulatory compliance regimes now oblige commercial organizations to take proper measures to safeguard the security and integrity … Read More