This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Home » Keywords: » intellectual property protection
Items Tagged with 'intellectual property protection'
By establishing a data protection program based in trust and transparency, security teams promote collaboration and innovation among all levels of the business, while still having the visibility needed to monitor for risks.
The metaverse poses many potential security concerns, including cryptocurrency fraud and identity management. Here's what to look out for going forward with virtual reality (VR) cybersecurity.
A San Diego couple has been charged by the federal government with stealing intellectual property related to pediatric medical treatments from Nationwide Children's Hospital in order to launch a pharmaceutical company in China.
Over the last several years, it has become commonplace for the media to publish information based on electronic materials that have been removed or copied either by organizational insiders and/or external people or groups. The publication of this type of material has impacted individuals, public and private organizations and various government agencies. While it is important for a free society to have the benefits of a free press serving as one of the checks and balances to protect citizens from abusive practices, we may have reached a point where we should re-examine how this is practiced. Are our criminal and civil statues effective on these issues?
BYOD is either a ticking time bomb or IT’s greatest opportunity. Whether you belong to the 40 percent of organizations that have policies or not, I guarantee people are using their own mobile devices at your office.
At some point during your career you will find yourself interacting with a search firm and/or a recruiter who has been assigned a project to fill a professional level security risk related role. This firm may or may not have a specialty security risk related practice and may or may not be a firm that you have ever heard of.
When the Department of Homeland Security purposefully dropped data disks and USB flash drives in the parking lots of federal agencies and government contractors, 60 percent of the found objects were inserted into an agency or contractor network.