Blog Posts Tagged with "Intellectual Property"
February 14, 2012 Added by:Rafal Los
Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...
February 07, 2012 Added by:Jason Clark
Intellectual property includes product designs, secret formulas, and other trade knowledge. It's what organized cybercrime, state governments and hackers are all going after. Why? Mostly because of the value. One stolen manufacturing process can be worth millions...
February 06, 2012 Added by:Rafal Los
Even if you did know where all your critical information is, you'd probably be powerless to control its sprawl. Let's face it, systems consume data and then become mobile - which is hardly something you can do anything about in a world where mobility is a key business driver...
February 02, 2012 Added by:Pierluigi Paganini
“I do not think today it is necessarily the number one threat, but it will be tomorrow... Counterterrorism... with the FBI is the present number one priority. But down the road, the cyberthreat, which cuts across all programs, will be the number one threat to the country...”
January 16, 2012 Added by:Rafal Los
This is part 5 in a series, and it's about pulling your data away from the clutches of the cloud. It's not all as crazy as that sounds though, because the cloud has real benefits, but it has to be approached with sanity rather than as the ostrich approaches the sandstorm...
January 11, 2012 Added by:Andrea Zapparoli Manzoni
Cyber-espionage, especially from the far east, has reached never seen before levels of sophistication and is now the world's primary cause of intellectual property theft. Some analyst are already stating that we just entered a new “Cold Cyberwar” age...
January 03, 2012 Added by:security curmudgeon
Infosec Media's aggregation does not honor fair use quoting, and does not respect copyright. For each article, the original title is left intact but the byline is stripped. This practice is not acceptable by any standards in journalism or information security...
December 27, 2011 Added by:david barton
So if First to File® is in the business of document management, how do their services have any relevance to a user entity’s financial statements? They are merely storing intellectual property (IP) in a web-based environment for their customers...
December 12, 2011 Added by:Headlines
"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...
December 09, 2011 Added by:Rafal Los
At the end of the day, shouldn't we all be professionals? I know it's nice to think that everyone is honest - but as the infosec world expands and there is a massive influx of people trying to make a name for themselves - there will be dishonesty. This is where the community comes in...
December 07, 2011 Added by:Headlines
"One trillion dollars disappears annually from the global economy because of cybercrime. Industrial secrets, copyright, intellectual property, state secrets become increasingly difficult to protect. Economies are running on these complex systems, which can be easily destroyed," Shea said...
December 01, 2011 Added by:Headlines
"We lose enormous intellectual property rights. We're under constant attack every day. And it's going to take a whole government approach," said General Martin Dempsey, Chairman of the Joint Chiefs of Staff...
November 28, 2011 Added by:Headlines
"With greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends"...
November 27, 2011 Added by:Javvad Malik
I fully sided with Corelan in the fact that they have put effort into producing so much good quality material only for Infosec Institute to steal it and try to make a profit from it. I picked up my cyber pitchfork with every intention to storm the castle. However, I’ve been thinking...
November 23, 2011 Added by:Headlines
"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."
November 19, 2011 Added by:security curmudgeon
With the recent rash of plagiarism exposure, one of the most frequent questions we get is "how do you find plagiarism"? Our methodology is home-grown and very simple. We assume that we are only catching some of it, and that our methodology causes us to miss some. It isn't rocket science...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013