Blog Posts Tagged with "Intellectual Property"
November 03, 2011 Added by:Headlines
"Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk, whether via remote exploitation of victims' computer networks, downloads of data to external media devices, or e-mail messages transmitting sensitive information..."
October 20, 2011 Added by:Infosec Island Admin
Occasionally it comes to our attention that material submitted for publication by a member may contain instances of unattributed content. Infosec Island's policy is to immediately remove the offending content to preserve the original author's copyright...
October 05, 2011 Added by:Headlines
“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."
September 19, 2011 Added by:Craig S Wright
Writers have taken Gregory D. Evans, “author” of "World’s No. 1 Hacker" book to task for stealing vast blocks of other people’s work. Yet these people remain. Despite their frauds in passing off a level of expertise they do not actually possess, people trust these security doppelgangers...
September 16, 2011 Added by:Craig S Wright
The issue is that some in the security industry leverage the works of others coupled with external promotion to seem more than they are. We all suffer for this, and in a field as critical as security the costs can be disproportionate to the damage an individual could seem to be able to create...
September 12, 2011 Added by:Headlines
“Preventing the loss or compromise of high-technology and vital national security information is a top priority of the FBI. This case is a prime example of what happens when a person decides to sell our nation’s most valuable secrets for individual gain..."
August 31, 2011 Added by:Stephen Marchewitz
No matter what you are told, simply writing a check to a software vendor and installing some code will not prevent all data loss. Depending on the intricacies of the organization, the money that DLP solutions require may likely be better spent on other security initiates...
August 11, 2011 Added by:Headlines
"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"
August 03, 2011 Added by:Brian McGinley
Intelligent businesses walk the security journey every day. Discussion prompts action, and I’ve found over my years in corporate management and data security that these four simple questions can often get the ball rolling...
July 29, 2011 Added by:Headlines
"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...
July 26, 2011 Added by:Headlines
Transnational Organized Crime networks are increasingly involved in cybercrime, which costs consumers billions of dollars annually, threatens sensitive corporate and government computer networks, and undermines worldwide confidence in the international financial system...
July 26, 2011 Added by:Headlines
The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...
July 22, 2011 Added by:Danny Lieberman
Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...
July 15, 2011 Added by:Headlines
"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."
July 04, 2011 Added by:Michael Fisher
Do you provide unmonitored access to your data and IP? What is really at stake here? Can we afford the status Quo when it comes to security? Is this a rarity or an everyday occurrence? So many questions, so few answers. Intellectual Property needs to be protected like a new born baby...
July 01, 2011 Added by:Rafal Los
Put yourself in the shoes of a few of the major organizations that have had high-profile data breaches due to compromised applications or web sites lately... the more they struggle and fight, the worse things appear to get. Why is this? Remember that there are no castle walls...
Israeli Military and Hamas trade Hacking Att... Adnan Ayber on 07-25-2014
Don’t Let Your Guard Down: Tragedies Pave ... shahbaz ocpfsd1 on 07-25-2014
FCC Seeks Public Comment on Mobile Data Coll... taylor white on 07-24-2014