Welcome!

News Feed Item

Finjan Holdings Appoints Julie Mar-Spinola As Vice President, Legal Operations

26-year Industry Veteran with Extensive Background in Intellectual Property, Litigation, and General Corporate Law

NEW YORK, Feb. 11, 2014 /PRNewswire/ -- Finjan Holdings, Inc. (OTC MKT: FNJN) (the "Company") today announced the appointment of Julie Mar-Spinola as Vice President, Legal Operations.  In this newly created role, Ms. Mar-Spinola will join the Company's senior management team and have a dual business and legal role, including building up Finjan's Intellectual Property (IP) assets, heading up legal operations, and overseeing the Company's patent enforcement program to protect its proprietary technologies and IP.  She will report to Finjan's President, Phil Hartstein.    

Ms. Mar-Spinola has over 26 years of experience in the technology sector.  Prior to joining Finjan, she was Interim General Counsel for core system BIOS firm, Phoenix Technologies, Ltd., where she successfully helped close the acquisition of system optimization software company, iolo technologies.  Prior to Phoenix, she was Vice President, Legal for thin film solar start-up, Alta Devices, Inc., where she architected and launched Alta's worldwide patent strategy, growing its U.S. patent portfolio over 200% during an 18-month period.  Before Alta Devices, she was the Vice President, Global Affairs for worldwide semiconductor manufacturer Atmel Corporation, where she transformed the IP, Litigation and Licensing department into a profit center for the company by, among other achievements, successfully leading to victory several major litigation matters and collecting over $100 million in jury awards.  Ms. Mar-Spinola joined Atmel from international law firm Heller Ehrman, where, being the firm's first patent attorney, she played a key role in the formation of Heller Ehrman's highly successful IP litigation group.  

"Julie is a seasoned corporate executive whose expertise in intellectual property and technology will make her an integral member of our senior management team," said Finjan's President, Phil Hartstein.  "Her extensive track record in IP asset management, patent litigation and dispute resolution strengthens our ability to protect our proprietary inventions resulting from decades-long R&D efforts and invested dollars while meeting Finjan's commitment to the advancement of innovations in the cyber security space." 

"I am excited and enthused about joining Finjan and the core management team here," added Ms. Mar-Spinola.  "In today's environment, cybersecurity is at the forefront of international and commercial interests and concerns.  It is quite energizing to be part of an organization who was the first to invent technologies able to detect and deflect software intrusions and malicious code delivery and who is committed to investing in new cybersecurity innovations to address such interests.  Importantly, Finjan's core values and best practices fit well with my own.  This position presents a unique opportunity not only to help advance the Company's growth objectives, but also to advance a culture of thoughtful, composed, and sound decision-making processes for the benefit of its shareholders, employees, and the community as a whole."

Ms. Mar-Spinola is a certified mediator for the U.S. District Court for the Northern District of California, specializing in patent disputes.  She is also the Co-Founder and Chairman of the Board of ChIPs Network, Inc. (ChIPs), a non-profit organization that supports, educates, and promotes the advancement of women in IP law, and a board member of Women's Audio Mission (WAM), a non-profit group dedicated to the education and advancement of women and girls in music production in the recording arts.  She is a registered patent attorney and admitted to the California State Bar.

With this key appointment, Finjan continues to round out its senior management team in support of the Company's planned growth strategy.  Recognized internationally as a pioneer and leader in web and network security, Finjan's decades-long investment in innovation is captured in its patent portfolio, centered around software and hardware technologies capable of proactively detecting previously unknown and emerging threats on a real-time, behavior-based basis.  Finjan has proudly licensed its patents and technology to several major software and technology companies around the world.

For Additional Information: www.finjan.com

ABOUT FINJAN:

Founded in 1997, Finjan is one of the first companies to develop and patent proprietary technology and software that is capable of detecting previously unknown and emerging threats on a real-time, behavior-based basis, in contrast to signature-based methods of intercepting only known threats to computers, which were previously standard in the online security industry. Finjan continues to be a leading online security and technology company, developing and patenting new proprietary technologies related to software that proactively detects malicious code and thereby protects end-users from identity and data theft, spyware, malware, phishing, trojans and other online threats.

Cautionary Note Regarding Forward-Looking Statements:

This press release contains statements, estimates, forecasts and projections with respect to future performance and events, which constitute forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. Those statements include statements regarding the intent and belief or current expectations of the Company and its affiliates and subsidiaries and their respective management teams. These statements may be identified by the use of words like "anticipate", "believe", "estimate", "expect", "intend", "may", "plan", "will", "should", "seek" and similar expressions and include any projections or estimates set forth herein. Investors and prospective investors are cautioned that any such forward-looking statements are not guarantees of future performance and involve risks and uncertainties, that actual results may differ materially from those projected in the forward-looking statements. Important factors that could cause actual results to differ materially from our expectations include, without limitation, those detailed in our filings with the Securities and Exchange Commission ("SEC"). Neither the Company nor any of its affiliates undertakes any obligation to update and forward-looking statements for any reason, even if new information becomes available or other events occur in the future.

The Company will continue to file annual, quarterly and current reports, proxy statements and other information with the SEC. The filings with the SEC will contain important information regarding the Company, its business, financial condition, results of operations and prospects.  One should assume that information contained in any of the filings with the SEC is only accurate as of the date specified in such filings.  The business, financial condition, results of operations and prospects may have changed materially since any such date. One is advised to carefully review the "Risk Factors" set forth in the Current Report on Form 8-K filed with the SEC on June 3rd, 2013.

Contact:
Media and Press Relations
Scott Eckstein
MWW Group
Telephone: (212) 827-3766
Email: [email protected]

Company Investor Relations
Joshua Weisbord
Finjan Holdings, Inc.
Telephone: (646) 568-3313
Email: [email protected]

SOURCE Finjan Holdings, Inc.

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
While some developers care passionately about how data centers and clouds are architected, for most, it is only the end result that matters. To the majority of companies, technology exists to solve a business problem, and only delivers value when it is solving that problem. 2017 brings the mainstream adoption of containers for production workloads. In his session at 21st Cloud Expo, Ben McCormack, VP of Operations at Evernote, discussed how data centers of the future will be managed, how the p...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and sh...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determ...