Access "Intellectual property protection do's and don'ts"
This article is part of the May 2007 issue of Nine tips to guarding your intellectual property
It's a cold day in late November. Two men are getting ready to board a plane bound for Southeast Asia at San Francisco International airport. In their luggage is millions of dollars worth of stolen trade secrets. These pilfered project designs, manuals, CDs, floppy diskettes and third-party licensed materials will allow nefarious foreign buyers to unlock the secrets of the most innovative U.S. companies, and aggressively compete with them on the open market. But just as the men are about to step onto the plane, they are arrested by a joint FBI/Computer Hacking and Intellectual Property (CHIP) investigative team. It sounds like an episode of a television crime drama. Yet this actually happened in 2001, when two men tried to flee the country with trade secrets stolen from a few of the biggest names in Silicon Valley. In this case, the criminals were stopped in their tracks, but theft of trade secrets is a growing and evolving problem, says Matt Parrella, assistant U.S. attorney and chief of the San Jose branch of the U.S. Department of Justice's CHIP unit. "... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Managed security services: Cybertrust's Managed Security Services
Cybertrust introduces a new service to help companies evaluate and prioritize security threats.
-
New Types of Computer Crime: Combating malware, botnets, phishing
The days of thrill-seeking script kiddies are over. Organized criminals are launching new types of computer crime, including browser malware, targeted email attacks and voice-based phishing, and using botnets to launch DDoS attacks.
-
FaceTime Communications' Internet Security Edition product review
In this product review, learn how FaceTime Internet Security Edition protects the enterprise from unauthorized use of applications such as instant messaging and VoIP. A hardened Linux rack-mounted appliance combined with a Windows-based server , the product catches malware, spyware and adware.
- Viewpoint: What if you can't afford pen-testing?
-
Product review: Yoggie's Yoggie Gatekeeper Pro
Product review of PC security tool called Yoggie Gatekeeper Pro. A Linux-based USB device, the product serves as a firewall, VPN gateway and integrated antivirus/Web filter gateway.
-
Product review: Watchfire's AppScan 7.0
Product review of Watchfire's AppScan 7.0, an application security testing tool for developers, quality assurance teams and penetration testers. The security product runs on Windows XP, Vista or 2003 Server.
- Events: Information security conferences for May 2007
-
Are you putting information at risk by using contractors?
Contractors can become the source of a security breach. This feature looks at the risk management steps, including access control and policies, that organizations should take when hiring contractors. A sidebar examines how a health care company uses NAC to control contractor access.
-
Managed security services: Cybertrust's Managed Security Services
-
-
Recent Releases: Security product briefs, May 2007
Read about security products released in May 2007.
-
Secure Reads: How to Cheat at Managing Information Security
Read a review of the book How to Cheat at Managing Information Security.
-
Role-based access controls
Identity management is a critical security challenge, but without viable standards for access control, your best efforts may be just a drop in the bucket.
-
Code Green Networks' Content Inspection Appliance 1500 product review
Product review of Code Green's Content Inspection Appliance, a data protection tool to help detect sensitive information leaving the enterprise.
-
Intellectual property protection do's and don'ts
Theft of intellectual property is a growing problem but many companies are not prepared to deal with this security threat. Learn about the risk involved with trade secrets, why companies are failing to protect intellectual property and tips for data protection, including risk assessment, encryption, and corporate governance.
-
Bit9 Parity product review for endpoint security
Product review of Bit9's Parity 3.5, a PC security tool designed to give enterprises control over what users can do on company computers and prevent executables in malware from running on desktops. Automatically installs SQL Server 2005 and Apache Web Server, which is used for remote administration.
-
Project Evros keeps laptops and data secure
Project Evros is a 3G-enabled PCMCIA card from Alcatel-Lucent Ventures for laptop security. End user connectivity is controlled via 3G, WiFi or LAN VPN, depending on the circumstances.
-
Recent Releases: Security product briefs, May 2007
-
Columns
-
Hacker demonstrates targeted attack
Hacker Robert Hansen, also known as RSnake, demonstrates the pains cybercriminals take to target specific organizations and individuals through an exercise posted on his blog, which targeted the head of Google's spam team. Hansen's exercise underscores the threat companies face from today's organized and patient cybercriminals.
-
Fight cybercrime by understanding a hacker's mind and attack motive
Computer crime laws and security policies aren't enough to combat increasingly sophisticated cybercrime. Understanding the criminal mind and a hacker's motive can help an organization determine what assets are most valuable and better distribute security resources.
-
Interview: PayPal CISO Michael Barrett
PayPal's 133 million online customers are the biggest ocean for phishers to plunder. CISO Michael Barrett wants to make it safe to be in the water, and he's not going at it alone. Backed by PayPal's sophisticated fraud models and help from ISPs, Barrett is succeeding in protecting the most-spoofed brand on the Internet.
-
Bruce Schneier and Marcus Ranum debate whether a 'Big Brother' watches today's information society
Is today's information society anything like the Big Brother world envisioned by George Orwell in his book 1984? Bruce Schneier and Marcus Ranum debate the topic.
-
Hacker demonstrates targeted attack
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO