Blog Posts Tagged with "Intellectual Property"

69dafe8b58066478aea48f3d0f384820

Government Domain Seizures Violate First Amendment

June 22, 2011 Added by:Headlines

"Valid claims of copyright infringement can be pursued in a manner that allows the accused parties to defend themselves. The unilateral seizure of domain names without a court ruling... is improper and should be strongly opposed by free speech advocates everywhere..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Richard Clarke: China's Cyberassault on America

June 17, 2011 Added by:Headlines

"What would we do if we discovered that Chinese explosives had been laid throughout our national electrical system? The public would demand a response. If, however, the explosive is a digital bomb that could do even more damage, our response is apparently muted—especially from our government..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Seventy-Seven Percent of Organizations Lost Data

June 09, 2011 Added by:Headlines

“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congress Bans Collaboration with China - Cites Espionage Risk

May 09, 2011 Added by:Headlines

The bill prohibits any engagements “to develop, design, plan, promulgate, implement or execute a bilateral policy, program, order, or contract of any kind to participate, collaborate, or coordinate bilaterally in any way with China or any Chinese-owned company..."

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Hyperdigitization: A Shift Towards the Virtual

May 09, 2011 Added by:Mike Meikle

Since intellectual property is data, risk managers will have to develop and monitor Key Performance and Key Risk Indicators to ensure their firm does not sacrifice their long-term competitive advantage for short-term cost savings. This is a penny-wise, pound-foolish strategy...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Holds the Advantage in Cyber Espionage Game

April 14, 2011 Added by:Headlines

According to Brenner, thousands of U.S. companies were targeted in the Aurora attacks, a great deal more than the 34 companies publicly identified. Brenner says the scale of the operation demonstrates China's "heavy-handed use of state espionage against economic targets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Focusing on Corporate Intellectual Capital

March 28, 2011 Added by:Headlines

Cybercriminals understand there is greater value in selling a corporations' proprietary information and trade secrets, which have little to no protection, making intellectual capital their new currency of choice...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary Federal Emails Reveal More Unreported Attacks

March 09, 2011 Added by:Headlines

Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Google Warned of MPAA Copyright Infringements

February 09, 2011 Added by:Headlines

The MPAA has apparently issued more than 100 warnings to Google regarding copyright infringement over the last few months. The MPAA warnings are usually directed at P2P file sharing users who trade movies online, but sending them to Google is enforcement on a whole new level...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Drug Cartels Profiting from Malware and Pirated Software

February 04, 2011 Added by:Headlines

David Finn, associate general counsel at Microsoft, cites evidence that criminal organizations are finding software piracy to be lucrative. One Mexican cartel is thought to make as much as $2.2 million dollars per day distributing pirated software. That is big business...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threats: Big Enough to be Parodied on The Simpsons

January 25, 2011 Added by:Headlines

If you have been parodied on the long running prime-time animated series The Simpsons, you can rest assured that you have finally arrived. The most recent member of the coveted Simpson parody club is, believe it or not, none other than the Insider Threat...

Comments  (0)

959779642e6e758563e80b5d83150a9f

Using DLP to Protect Your Source Code

January 17, 2011 Added by:Danny Lieberman

This points at a wider problem for software developers everywhere. Whether you collaborate with a partner on development or outsource an entire project, you expose sensitive software and intellectual assets to people people with limited allegiance to your firm...

Comments  (1)

959779642e6e758563e80b5d83150a9f

Seven Steps to Improve Small Business Data Security

January 14, 2011 Added by:Danny Lieberman

Many consultants tell businesses that they must perform a detailed business process analysis and build data flow diagrams of data and business processes. This is an expensive task to execute and extremely difficult to maintain that can require large quantity of billable hours...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Oracle Hit With $100 Million Source Code Theft Suit

January 12, 2011 Added by:Headlines

Software firm 2FA has filed a $100 million dollar lawsuit against Oracle subsidiary Passlogix alleging the outfit stole source code related to authentication software. The suit is specific to Passlogix's v-Go product, which was developed prior to Oracle's acquisition of the company...

Comments  (0)

C6eac1ead1a5946e78fb19701ff40acd

Dr. InfoSec's Quotes of the Week (013)

December 04, 2010 Added by:Christophe Veltsos

Who said: "Information security affects more organizations on more levels as technology permeates every functional area of a business and more staff members assume the role of knowledge worker..."?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Employees Plan to Steal Company Data

November 24, 2010 Added by:Headlines

A new study reveals an alarming statistic: The majority of workers plan on stealing company data if and when they leave their current positions. The survey of 1000 white collar employees conducted by Imperva shows that more than two-thirds are willing to take everything from client and customer records to the intellectual property of their employer...

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »