Egress Monitoring

Finjan TeamBlog, Cybersecurity

Finjan Egress Monitoring

With so many threats looming from intruders and malicious software originating outside of systems and corporate LANs, it’s easy to overlook the fact that security lapses and vulnerabilities can equally emanate from within a connected system or private network, and make their way out to cause damage as well. So for comprehensive security coverage, it’s essential not only to have … Read More

Network DMZ Zones

Finjan TeamBlog, Cybersecurity

Finjan Network DMZ Zones

Online transactions are an unavoidable part of today’s economy. But when corporate networks expose their infrastructure and resources to the largely unsecured public internet, they throw themselves open to the possibility of attack. One way of reducing this risk is through the establishment of safe zones known as DMZ. What’s a DMZ? DMZ stands for demilitarized zone – a throwback … Read More

Application Layer Security and the OSI Model

Finjan TeamBlog, Cybersecurity

Finjan Application Layer Security and the OSI Model

In an increasingly treacherous cyber-security landscape – and with corporate networks expanding beyond desktops and on-site data centers to include cloud connections and remote and mobile workers – enterprise software presents cyber-criminals and hackers with potential opportunities to steal information and cause damage or distress. This highlights the need for security to extend to both the network and the software … Read More

Access Control Systems – A Closer Look at the Bell-LaPadula Model

Finjan TeamBlog, Cybersecurity

Finjan Access Control  Systems   A Closer Look at the Bell LaPadula Model

While controlling user access to protected networks and sensitive data is important in the private sector, it’s crucial to maintaining security in government and military circles. So much so that a specific protocol was adopted for these applications. Known as the multi-level or Bell-LaPadula Model (BLM, or sometimes BLP), this access control system forms the basis of our discussion today. … Read More

A Closer Look at Offensive Network Security

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at Offensive Network Security

For years, access control measures, antivirus monitoring, intrusion detection, the detection of software bugs, and similar strategies have been the mainstay of cyber-security. These are largely passive techniques, dedicated to the defense of systems and networks. And they rely on having prior knowledge of the intruder’s methodologies and tools (such as malware and virus signature databases) to aid in detection … Read More

The Next Generation of Endpoint Security

Finjan TeamBlog, Cybersecurity

Finjan The Next Generation of Endpoint Security

Accepted wisdom is already shifting to the view that network security must go beyond the setting up of firewalls, antivirus protection, and peripheral defenses. With BYOD (Bring Your Own Device) and the rise of the mobile workforce, vulnerabilities and a proliferation of possible access points for malicious intruders are being introduced by user devices such as laptops, mobile phones, USB … Read More