Blog Posts Tagged with "Intellectual Property"

69dafe8b58066478aea48f3d0f384820

Cyber Espionage Report Fingers China and Russia

November 03, 2011 Added by:Headlines

"Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk, whether via remote exploitation of victims' computer networks, downloads of data to external media devices, or e-mail messages transmitting sensitive information..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Infosec Island's Position on Plagiarism

October 20, 2011 Added by:Infosec Island Admin

Occasionally it comes to our attention that material submitted for publication by a member may contain instances of unattributed content. Infosec Island's policy is to immediately remove the offending content to preserve the original author's copyright...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Congressman Confronts China over Cyber Espionage

October 05, 2011 Added by:Headlines

“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Plagiarism and the Security Professional part 2

September 19, 2011 Added by:Craig S Wright

Writers have taken Gregory D. Evans, “author” of "World’s No. 1 Hacker" book to task for stealing vast blocks of other people’s work. Yet these people remain. Despite their frauds in passing off a level of expertise they do not actually possess, people trust these security doppelgangers...

Comments  (0)

8b5e0b54dfecaa052afa016cd32b9837

Internet Piracy, Plagiarism and the Security Professional

September 16, 2011 Added by:Craig S Wright

The issue is that some in the security industry leverage the works of others coupled with external promotion to seem more than they are. We all suffer for this, and in a field as critical as security the costs can be disproportionate to the damage an individual could seem to be able to create...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Insider Threat: Top Scientist Pleads Guilty to Espionage

September 12, 2011 Added by:Headlines

“Preventing the loss or compromise of high-technology and vital national security information is a top priority of the FBI. This case is a prime example of what happens when a person decides to sell our nation’s most valuable secrets for individual gain..."

Comments  (0)

0356a83ecb15c8e33b00560d7bebe47f

Nine Reasons Why You're Not Ready for DLP

August 31, 2011 Added by:Stephen Marchewitz

No matter what you are told, simply writing a check to a software vendor and installing some code will not prevent all data loss. Depending on the intricacies of the organization, the money that DLP solutions require may likely be better spent on other security initiates...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

E9e4b2893895604b1b913b7b02e6640b

Four Questions to Start the Security Discussion

August 03, 2011 Added by:Brian McGinley

Intelligent businesses walk the security journey every day. Discussion prompts action, and I’ve found over my years in corporate management and data security that these four simple questions can often get the ball rolling...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The U.S. and China are Engaged in a Cyber Cold War

July 29, 2011 Added by:Headlines

"China is likely using its maturing computer network exploitation capability to support intelligence collection against the U.S. government and industry by conducting a long term, sophisticated, computer network exploitation campaign," according to a Northrop Grumman report...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

National Security Council on Transnational Organized Crime

July 26, 2011 Added by:Headlines

Transnational Organized Crime networks are increasingly involved in cybercrime, which costs consumers billions of dollars annually, threatens sensitive corporate and government computer networks, and under­mines worldwide confidence in the international financial system...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

UK Cabinet Office Report: The Cost of Cyber Crime

July 26, 2011 Added by:Headlines

The report indicates that, at a total estimated cost of £21bn, over three-quarters of the economic impact of cyber crime in the UK is felt by business. In all probability, and in line with worst-case scenarios, the real impact of cyber crime is likely to be much greater...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Practical Security Management for Startups

July 22, 2011 Added by:Danny Lieberman

Startup management needs to know how much their information security measures will cost and how it helps them run the business. Business Threat Modeling (TM) is a practical way for a manager to assess the operational risk for the startup in dollars and cents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

Fb2f7bf492894baca81fd99ef7a8516c

Protecting Our Data

July 04, 2011 Added by:Michael Fisher

Do you provide unmonitored access to your data and IP? What is really at stake here? Can we afford the status Quo when it comes to security? Is this a rarity or an everyday occurrence? So many questions, so few answers. Intellectual Property needs to be protected like a new born baby...

Comments  (8)

0a8cae998f9c51e3b3c0ccbaddf521aa

How a Major Data Breach is Like Quicksand

July 01, 2011 Added by:Rafal Los

Put yourself in the shoes of a few of the major organizations that have had high-profile data breaches due to compromised applications or web sites lately... the more they struggle and fight, the worse things appear to get. Why is this? Remember that there are no castle walls...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »
Most Liked