KRACK Wi-Fi Vulnerability

Finjan TeamBlog, Cybersecurity

Finjan KRACK Wi Fi Vulnerability

Accepted as the current standard for the secure encryption of Wi-Fi networks, Wi-Fi Protected Access 2 or WPA2 has for some time been the automatic choice for users wishing to set up a wireless access point that’s free from the threat of eavesdroppers. But as with all things in the digital realm, evolving methods and technologies can and do conspire … Read More

Unicast, Broadcast, Multicast Data Transmission – Key Differences, Benefits and Drawbacks

Finjan TeamBlog, Cybersecurity

Finjan Unicast, Broadcast, Multicast Data Transmission   Key Differences, Benefits and Drawbacks

With the internet and digital technology blurring the boundaries between content, communication, and media types, these days you’re just as likely to tune into a concert, movie, or television show on your mobile phone, as you are to catch the same event on radio, at a cinema, or through your home entertainment system. This transition may appear seamless, but behind … Read More

A Closer Look at Network Topology

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at Network Topology

In much the same way as topography describes the lay of the land for terrestrial environments, a topology is used to describe the layout of a computer network: Which components are physically or virtually connected to which, how those connections are made or preserved, and so on. Given the number of different requirements that networks are set up to meet, … Read More

Network Security and Role-Based Access Control

Finjan TeamBlog, Cybersecurity

Finjan Network Security and Role Based Access Control

Within any organization, there may be a diverse range of job functions, each with its own specific tasks, responsibilities, and roles to play in the overall functioning of the enterprise. With much of the work in contemporary businesses being conducted through the use of networked computers and software, there’s a need for enterprises to not only make these resources available … Read More

Identity Access Management – How It Is Used to Protect the Enterprise

Finjan TeamBlog, Cybersecurity

Finjan Identity Access Management   How It Is Used to Protect the Enterprise

With advances in technology and the growth of the digital economy, enterprise computer networks have expanded beyond the in-house data center to include wireless and mobile applications and networks, and to embrace the internet at large. Good business practice and the demands of regulatory compliance regimes now oblige commercial organizations to take proper measures to safeguard the security and integrity … Read More

A Closer Look at Multilevel Lattice Security Models

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at Multilevel Lattice Security Models

Organizations looking to regulate access to the information they routinely work with, and computer systems and communications networks seeking to preserve the confidentiality and integrity of the data they store or transmit will typically require some kind of formalized framework to govern how this is done. Information classifications such as Universal, Unclassified, Confidential, Secret, and Top Secret are one manifestation … Read More

What is Link Layer Encryption?

Finjan TeamBlog, Cybersecurity

Finjan What is Link Layer Encryption?

Network security is frequently implemented by considering the network as a series of layers, each dedicated to a particular function (data transport, applications, user interactions, etc.). This model has the underlying logic that, with several layers to have to work against, any potential attacker won’t find it easy to break through to the heart or kernel of the system, where … Read More

Anatomy of a TCP Sequence Prediction Attack

Finjan TeamBlog, Cybersecurity

Finjan Anatomy of a TCP Sequence Prediction Attack

With so much of our business and personal lives relying on the transfer of information between points on the internet, it’s little wonder that cyber-criminals have long favored these connections as a target for their operations. Hijacking connections and/or intercepting data streams offers hackers a prime opportunity to extract valuable information assets, siphon off digital financial ones, or to interject … Read More

Blacklisting vs Whitelisting – Understanding the Security Benefits of Each

Finjan TeamBlog, Cybersecurity

Finjan Blacklisting vs Whitelisting   Understanding the Security Benefits of Each

Guarding individual computer systems and organizational networks from the effects of malicious software or the intrusion of unauthorized users and applications begins with solid perimeter and endpoint defenses, and an effective method of access control. Though opinions differ as to which is best, two approaches dominate in the bid to restrict and regulate access to vital system and network resources … Read More