IDaaS (Identity as a Service) – A Single Sign-on Service for the Cloud

Finjan TeamBlog, Cybersecurity

Finjan IDaaS (Identity as a Service)   A Single Sign on Service for the Cloud

The technology of the cloud makes it possible to vastly expand the reach and capabilities of individuals and organizations – through its ability to boost computing and storage capacity through the use of multiple remote servers, the potential to combine infrastructure, software, and services, and the power to provide access to potentially global pools of talent, money, and resources. This … Read More

The Origins of Kerckhoff’s Principle and How it is Used in Encryption Today

Finjan TeamBlog, Cybersecurity

Finjan The Origins of Kerckhoffs Principle and How it is Used in Encryption Today

In this era of disclosure, transparency, and the public internet, maintaining exclusive rights or control over knowledge and techniques is a virtual impossibility. Any measures put in place to safeguard the transfer and storage of information have to contend not only with external threats, but also with the intervention of higher authorities (as in the case of investigations by government … Read More

Identity Access Management – How It Is Used to Protect the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Identity Access Management   How It Is Used to Protect the Enterprise

With advances in technology and the growth of the digital economy, enterprise computer networks have expanded beyond the in-house data center to include wireless and mobile applications and networks, and to embrace the internet at large. Good business practice and the demands of regulatory compliance regimes now oblige commercial organizations to take proper measures to safeguard the security and integrity … Read More

VPN Restrictions in China, Russia and Other Countries

Finjan TeamBlog, Cybersecurity

Finjan VPN Restrictions in China, Russia and Other Countries

Although authorities in Europe have taken a stand on data privacy which comes down firmly on the side of the consumer, internet users in other parts of the world haven’t been so lucky. This has sparked a renewed interest in Virtual Private Network or VPN services and applications, as a hedge against government surveillance, targeted advertising, and the attention of … Read More

Shift Row Transformation and Other Examples of Advanced Encryption

Finjan TeamBlog, Cybersecurity

Finjan Shift Row Transformation and Other Examples of Advanced Encryption

These days, we’re often warned about the dangers of hacking and data theft, or reminded of the need to protect our vital documents, sensitive information, and credentials by encryption, when they’re transmitted over the internet or an unprotected network. But what does that mean, exactly? Well, in simple terms, encryption is the process of taking a recognizable item (such as … Read More

Digital Signatures and Information Security

Finjan TeamBlog, Cybersecurity

Finjan Digital Signatures and Information Security

As online and electronic transactions gain as much or more validity than traditional paper-based ones, there’s an increasing need to ensure the authenticity and integrity of the various parties involved, the data and assets traded between them, and the overall security of the transaction process. One method used to accomplish this is the use of digital signatures. What Are Digital … Read More

How to Prevent Phishing Attacks – 9 Helpful Tips to Avoid Caught

Finjan TeamBlog, Cybersecurity

Finjan How to Prevent Phishing Attacks   9 Helpful Tips to Avoid Caught

In this article, we will look at examples and advice on how to prevent phishing attacks. In digital terms, the practice of phishing – using threatening or enticing messages to compel a recipient to rashly give out personal or financial data, or to blindly rush to a booby-trapped website – is almost as old as the riverbank activity that its … Read More

Top 5 Emerging Security Technologies

Finjan TeamBlog, Cybersecurity

Finjan Top 5 Emerging Security Technologies

Like computing itself, the information security or InfoSec landscape is continuously evolving. What was once the cyber-threat or threat remedy of the month can give way to alternatives, as new techniques and technologies are pioneered by cyber-criminals or InfoSec professionals, alike. As 2017 moves into its second quarter, we’ll be looking at five of the emerging security technologies that are … Read More

The Use of Biometrics in the Mobile Space

Finjan TeamBlog, Cybersecurity

Finjan The Use of Biometrics in the Mobile Space

With data breaches, fraud, and identity theft so often in the news, network and Internet users at all levels are anxious for ways to safeguard their information and protect themselves from malicious intrusions and criminal acts. But passwords, PINs, security codes and encryption keys are notoriously difficult to remember and use – especially when so many people transact their affairs … Read More