IDaaS (Identity as a Service) – A Single Sign-on Service for the Cloud

Finjan TeamBlog, Cybersecurity

Finjan IDaaS (Identity as a Service)   A Single Sign on Service for the Cloud

The technology of the cloud makes it possible to vastly expand the reach and capabilities of individuals and organizations – through its ability to boost computing and storage capacity through the use of multiple remote servers, the potential to combine infrastructure, software, and services, and the power to provide access to potentially global pools of talent, money, and resources. This … Read More

The Origins of Kerckhoff’s Principle and How it is Used in Encryption Today

Finjan TeamBlog, Cybersecurity

Finjan The Origins of Kerckhoffs Principle and How it is Used in Encryption Today

In this era of disclosure, transparency, and the public internet, maintaining exclusive rights or control over knowledge and techniques is a virtual impossibility. Any measures put in place to safeguard the transfer and storage of information have to contend not only with external threats, but also with the intervention of higher authorities (as in the case of investigations by government … Read More

Identity Access Management – How It Is Used to Protect the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Identity Access Management   How It Is Used to Protect the Enterprise

With advances in technology and the growth of the digital economy, enterprise computer networks have expanded beyond the in-house data center to include wireless and mobile applications and networks, and to embrace the internet at large. Good business practice and the demands of regulatory compliance regimes now oblige commercial organizations to take proper measures to safeguard the security and integrity … Read More

VPN Restrictions in China, Russia and Other Countries

Finjan TeamBlog, Cybersecurity

Finjan VPN Restrictions in China, Russia and Other Countries

Although authorities in Europe have taken a stand on data privacy which comes down firmly on the side of the consumer, internet users in other parts of the world haven’t been so lucky. This has sparked a renewed interest in Virtual Private Network or VPN services and applications, as a hedge against government surveillance, targeted advertising, and the attention of … Read More

IoT Security Flaws

Finjan TeamBlog, Cybersecurity

Finjan IoT Security Flaws

With current estimates suggesting that the global network of online and inter-connected smart hardware and applications known as the IoT or Internet of Things will expand to over 20 billion devices by 2020, the market for self-monitoring cars, household appliances that check in regularly with your local supermarket, and numerous other such gadgets, looks set to grow at a steady … Read More

Shift Row Transformation and Other Examples of Advanced Encryption

Finjan TeamBlog, Cybersecurity

Finjan Shift Row Transformation and Other Examples of Advanced Encryption

These days, we’re often warned about the dangers of hacking and data theft, or reminded of the need to protect our vital documents, sensitive information, and credentials by encryption, when they’re transmitted over the internet or an unprotected network. But what does that mean, exactly? Well, in simple terms, encryption is the process of taking a recognizable item (such as … Read More

Blacklisting vs Whitelisting – Understanding the Security Benefits of Each

Finjan TeamBlog, Cybersecurity

Finjan Blacklisting vs Whitelisting   Understanding the Security Benefits of Each

Guarding individual computer systems and organizational networks from the effects of malicious software or the intrusion of unauthorized users and applications begins with solid perimeter and endpoint defenses, and an effective method of access control. Though opinions differ as to which is best, two approaches dominate in the bid to restrict and regulate access to vital system and network resources … Read More

Digital Signatures and Information Security

Finjan TeamBlog, Cybersecurity

Finjan Digital Signatures and Information Security

As online and electronic transactions gain as much or more validity than traditional paper-based ones, there’s an increasing need to ensure the authenticity and integrity of the various parties involved, the data and assets traded between them, and the overall security of the transaction process. One method used to accomplish this is the use of digital signatures. What Are Digital … Read More

Top 5 Emerging Security Technologies

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Emerging Security Technologies

Like computing itself, the information security or InfoSec landscape is continuously evolving. What was once the cyber-threat or threat remedy of the month can give way to alternatives, as new techniques and technologies are pioneered by cyber-criminals or InfoSec professionals, alike. As 2017 moves into its second quarter, we’ll be looking at five of the emerging security technologies that are … Read More