Pros and Cons of Certificate Pinning in Endpoint Security

finjanmobileBlog, Mobile Security

Certificate Pinning

With smartphones, tablets, and other mobile devices assuming equal importance with connected hardware and desktop-based systems as viable ways of gaining access to corporate networks and the internet at large, security professionals are having to devote additional attention to keeping these portable “endpoints” safe – just like any other network resource. One way of doing this (which has been particularly … Read More

Mobile Device Authentication – A Look at Behavior-based Authentication

finjanmobileBlog, Mobile Security

Behavior-based Authentication

Though they’re growing to become as much a part of everyday life as the clothes we put on every morning, mobile devices are still looked upon as a useful appendage, rather than a vulnerable repository for our priceless personal data, financial information, photographs, and contacts. A 2014 study in the Symposium on Usable Privacy and Security (SOUPS) revealed that 57% … Read More