Posts Tagged: "internet security"

Effective data management and governance for social media and cloud collaboration platforms

While there are a lot of irreplaceable benefits to leveraging social media and cloud collaboration platforms for business, there are also risks that, if not managed properly, leave organizations vulnerable to business and legal risk… According to Osterman, sometimes takes a significant event to drive decision makers to action in the context of good information governance. For instance, a lawsuit in which an organization is not able to adequately respond to an eDiscovery order, or a regulator’s request for information that cannot be properly satisfied, will often move information governance from the back burner to a properly funded and executed initiative.

Finjan forms new subsidiary Finjan Blue to execute web security patent acquisition agreement with IBM

East Palo Alto, CA-based web security firm Finjan Holdings recently filed a Form 8-K with the U.S. Securities and Exchange Commission (SEC) which disclosed a patent assignment agreement made with Armonk, NY-based information technology giant IBM (NYSE:IBM). Under the terms of the agreement, Finjan Blue, a newly formed subsidiary of Finjan, will acquire a series of IBM security-related patents with potential pathways for the IBM and Finjan to work collaboratively on development of those patented technologies.

FCC Chairman Pai seeks return to ‘light-touch framework’ for Internet regulation

Between 2014 and 2016, Pai said that the country’s 12 largest ISPs have decreased their spending by $3.6 billion, a drop of 5.6 percent in investment. Pai also cited a letter sent to the FCC from a collection of 22 ISPs, each serving about 1,000 customers or fewer, who argue that the Title II common carrier regulations have affected their ability to obtain financing and have at least slowed the development and deployment of new infrastructure and services… Pai believes that the return to a light-touch framework would benefit Americans in a variety of ways. The lighter regulatory framework should spur broadband deployment towards better Internet service, create jobs for Americans to deploy those networks, boost marketplace competition, end government micromanagement and secure Internet privacy by returning authority to the FTC.

Black Hats Look for Low Hanging Fruit: Law firms are the new target for IP theft

The USPTO has also created an increasingly sophisticated cyber security defense system to protect the nation’s patents and related information. In this multi-layered system, the USPTO guards against virtually every possible type of intrusion, protecting their systems against a multitude of potential denizens, from lone wolf to suspected nation-state Advanced Persistent Threat (APT) attackers. Compared to the USPTO, or even corporations, most law firms are easy targets and the client IP on their networks is low hanging fruit that is all too easily harvested. Too many law firms still view ‘reasonable’ security as signature-based (passwords) access and malware protection, like McAfee, as good enough. Today, it is not nearly enough.

Growing market for wearable tech increases value for security

Consumers are very interested in knowing that their data is protected, and not simply their financial account data. However, as wearable technologies and the closely related Internet of Things continue to become more robust, there have been questions raised over the privacy of data created and transmitted by these devices as well as the capability of others to gain unauthorized remote access through a cyber attack. Technologies designed to provide fitness tracking could have the unintended consequence of giving a party gaining unauthorized access to that data the ability to track their movement.

USPTO, NIST on Front Lines of Cybersecurity Partnership

Throughout 2014, stories of major data breaches and hacking incidents have dominated the mainstream media. Customers of major corporations like Target, Home Depot, JPMorgan Chase, Bank of America and Neiman Marcus have been the targets of malware, phishing schemes and other malicious acts of cyber crime within the past year. As a result, hackers have gained access to private information pertaining to tens of millions of financial accounts…. During 2013, there were a total of 7,577 patent applications filed with the USPTO in the field of cybersecurity. The vast majority of these patent applications are coming from the United States, with the most filings coming from the states of California, New York and Texas. The top five companies filing patents within this field were IBM, Symantec, Google, Microsoft and Samsung.

How to Respond to Cyber Attacks on Your Business

Identity theft, and the various cyber attacks undertaken to accomplish this crime, are somewhat related to infringements of intellectual properties that we cover here at IPWatchdog. The top asset that any company has is their good name, and much like a trademark that has become compromised, it’s very difficult for an individual to fix misappropriation of their identity even when it’s the fault of a malicious hacker. But as deeply troubling as it is for individuals to have their identity stolen it can be equally crippling for the businesses who allow for sensitive personal information to be taken by nefarious actors. Most businesses simply cannot afford to have their good business name associated with a cyber attack.

Blogging Business: 7 Questions to a Blogging Business Plan

On Tuesday, April 13, 2010, I will be giving a presentation to the Toledo Intellectual Property Law Association. My presentation will focus on the law, ethics and business of blogging as it specifically pertains to attorneys. This present article focuses on getting started from a conceptual or philosophical standpoint, and future articles in the blogging business series will address legal issues associated with blogging, as well as the mechanics of blogging. So, without further ado, here are the 7 critical questions for a blogging business plan.

Twitter Faces Security Issues Again and Again

Essentially what it sounds like is that by getting you to sign into your twitter account, the scammers are able to look for patterns between the accounts you sign into using a form of spyware. If you use the same or similar passwords on websites of different kinds, chances are you are using the same or similar login for all of your accounts.

Beware of Viruses When Looking for Love Online

PC Tools, a leading security software vendor with offices in Sydney, San Francisco, London, Shannon (Ireland), Melbourne, Kiev, and Boulder,  today issued a warning  to caution Internet users that virtual venues for dating, social networking, and adult entertainment all present dangerous digital risks from computer viruses, spyware and phishing, and with Valentine’s Day tomorrow the holiday is likely lead cybercriminals and…

CA Internet Security & Identity Theft Protection

On Monday, November 24, 2008, CA announced the immediate availability of its CA Internet Security Suite Plus 2009. Each element of the suite, which includes a personal firewall, anti-virus, anti-spyware, anti-spam and anti-phishing software has been enhanced to provide even stronger protection against a wide-range of emerging online threats. This latest edition of CA Internet Security also includes at no…