Blog Posts Tagged with "Intellectual Property"

0a8cae998f9c51e3b3c0ccbaddf521aa

Difference Between Spreading Information and Enabling Crime

February 14, 2012 Added by:Rafal Los

Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...

Comments  (2)

54b393d8c5ad38d03c46d060fa365773

Four Keys for Intellectual Property Protection

February 07, 2012 Added by:Jason Clark

Intellectual property includes product designs, secret formulas, and other trade knowledge. It's what organized cybercrime, state governments and hackers are all going after. Why? Mostly because of the value. One stolen manufacturing process can be worth millions...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention Step 6: Encrypting Data at Rest

February 06, 2012 Added by:Rafal Los

Even if you did know where all your critical information is, you'd probably be powerless to control its sprawl. Let's face it, systems consume data and then become mobile - which is hardly something you can do anything about in a world where mobility is a key business driver...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

Acts of Terrorism vs. Cyber Threats: New Offense Scenarios

February 02, 2012 Added by:Pierluigi Paganini

“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention Step 5: Disable Access to Cloud Storage Services

January 16, 2012 Added by:Rafal Los

This is part 5 in a series, and it's about pulling your data away from the clutches of the cloud. It's not all as crazy as that sounds though, because the cloud has real benefits, but it has to be approached with sanity rather than as the ostrich approaches the sandstorm...

Comments  (0)

D551093f5d8af724e17929c91eb90d63

Espionage, Cyberwar and Trans-National Cybercrime

January 11, 2012 Added by:Andrea Zapparoli Manzoni

Cyber-espionage, especially from the far east, has reached never seen before levels of sophistication and is now the world's primary cause of intellectual property theft. Some analyst are already stating that we just entered a new “Cold Cyberwar” age...

Comments  (0)

B8b580348b4e717042d0e394ee072001

Serial Copyright Violations by 7Safe's InfosecMedia.org

January 03, 2012 Added by:security curmudgeon

Infosec Media's aggregation does not honor fair use quoting, and does not respect copyright. For each article, the original title is left intact but the byline is stripped. This practice is not acceptable by any standards in journalism or information security...

Comments  (2)

8fcd3af85e00d8db661be6a882c6442b

SSAE 16 "First to Fail"?

December 27, 2011 Added by:david barton

So if First to File® is in the business of document management, how do their services have any relevance to a user entity’s financial statements? They are merely storing intellectual property (IP) in a web-based environment for their customers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Handful of Chinese Hackers Responsible for Majority of Attacks

December 12, 2011 Added by:Headlines

"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Plagiarism in IT Security - Walking a Fine Line

December 09, 2011 Added by:Rafal Los

At the end of the day, shouldn't we all be professionals? I know it's nice to think that everyone is honest - but as the infosec world expands and there is a massive influx of people trying to make a name for themselves - there will be dishonesty. This is where the community comes in...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

NATO: Cybercrime Drains One Trillion Dollars from Economy Yearly

December 07, 2011 Added by:Headlines

"One trillion dollars disappears annually from the global economy because of cybercrime. Industrial secrets, copyright, intellectual property, state secrets become increasingly difficult to protect. Economies are running on these complex systems, which can be easily destroyed," Shea said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Military Chief Warns of Economic Cyber Threat

December 01, 2011 Added by:Headlines

"We lose enormous intellectual property rights. We're under constant attack every day. And it's going to take a whole government approach," said General Martin Dempsey, Chairman of the Joint Chiefs of Staff...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Protecting and Promoting the UK in a Digital World

November 28, 2011 Added by:Headlines

"With greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends"...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Plagiarism is Bad - Oh Look, A New Song to Download...

November 27, 2011 Added by:Javvad Malik

I fully sided with Corelan in the fact that they have put effort into producing so much good quality material only for Infosec Institute to steal it and try to make a profit from it. I picked up my cyber pitchfork with every intention to storm the castle. However, I’ve been thinking...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Espionage: Protecting American Innovation in Cyberspace

November 23, 2011 Added by:Headlines

"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."

Comments  (0)

B8b580348b4e717042d0e394ee072001

Attrition.org Errata Project: Detecting Plagiarism

November 19, 2011 Added by:security curmudgeon

With the recent rash of plagiarism exposure, one of the most frequent questions we get is "how do you find plagiarism"? Our methodology is home-grown and very simple. We assume that we are only catching some of it, and that our methodology causes us to miss some. It isn't rocket science...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »