Why Tech Companies Are Resistant to Adding Backdoors

Finjan TeamBlog, Cybersecurity

Finjan Why Tech Companies Are Resistant to Adding Backdoors

So-called “backdoors” built into application software, hardware, and operating systems can be the breaking point for end-to-end and device-based encryption, access controls, and other security measures put in place to protect desktop and mobile devices. And they’re a mechanism that government and law enforcement agencies across the globe are putting increasing pressure on manufacturers, vendors, and online service providers to … Read More

A Closer Look at CMM – Software Capability Maturity Model

Finjan TeamBlog, Cybersecurity

Finjan A Closer Look at CMM   Software Capability Maturity Model

With software being the potentially lucrative but often cut-throat business that it is, it makes sense for organizations to establish robust and repeatable techniques and processes for developing applications that consistently maintain a high standard of usability, reliability, and integrity. One method of ensuring this is by using the Capability Maturity Model or CMM. The Origins of the Capability Maturity … Read More