Posts Tagged: "security"

Do Your ‘Home Work’: Keeping Trade Secrets Safe While Working Remotely

An essential element of trade secret protection is that the owner has made “reasonable” efforts to keep the information a secret. But as the Uniform Trade Secrets Act tells us, those efforts must be reasonable “under the circumstances.” When circumstances change, as they have recently, we need to recalibrate. In fact, when things return to whatever normal turns out to be, this will be an excellent opportunity for every organization to revisit the way in which it approaches management of its most important information assets.

Huawei’s Patents are Not the Enemy

Here we go again! Another day, another ridiculous attack on the U.S. patent system. This time the attack comes from the R Street Institute, who claims that patents are too strong and are inhibiting American companies from achieving success in the race for leadership in the 5G marketplace and continued leadership in Artificial Intelligence (AI). R Street will hold a panel discussion on their wildly outlandish theory, for which they can’t possibly have any factual support, on Tuesday, October 15, in the Capitol Visitor Center. In the announcement they claim that patents are inhibiting American companies because Chinese telecommunications company, Huawei, asserted more than 200 patents against Verizon Communications earlier this year. Therefore—and ipso facto—patents are too strong and American companies are suffering. There may be legitimate security concerns around Huawei’s infrastructure, but to suggest that the company’s patents are at the root of these threats is in a word—Absurd!

This Week in D.C.: Think Tanks Host Events on China and AI, Utilities Cybersecurity and Technology Supply Chains

This week in Washington D.C., the Congressional hearings schedule is empty as both the U.S. Senate and the U.S. House of Representatives enter work periods. However, Monday kicks off with a pair of think tank events on global technology issues at the Center for Strategic and International Studies and the Atlantic Council. The Brookings Institution hosts a pair of tech-related events this week—one focused on threats to democracy through digital capitalism and the other exploring how tech policy has altered the U.S.-China relationship. Other events include a look at securing supply chains for information and communication technology at the Carnegie Endowment for International Peace and a look at the future of the Marine Corps at The Heritage Foundation.

California Ahead of Federal Government in Cybersecurity for the Internet of Things

The bill would create a new title within California Civil Code named Security of Connected Devices. The first part of this title would require a manufacturer of a connected device, defined as any object capable of connecting to the Internet and assigned either an Internet protocol address or a Bluetooth address, to equip the device with reasonable security features appropriate to the nature and function of the device, appropriate to the information it may collect or transmit and designed to protect both the device and the information it contains from unauthorized access.

Samsung Galaxy Smartphones Targeted in Infringement Case Over Secure Device Authentication Patents

Texas-based patent owner PACid Technologies filed a complaint alleging patent infringement committed by South Korean consumer electronics giant Samsung (KRX:005930). The case, filed in the Eastern District of Texas, focuses on authentication protocols utilized by Samsung devices which allegedly infringe upon a pair of patents owned by PACid.

Effective data management and governance for social media and cloud collaboration platforms

While there are a lot of irreplaceable benefits to leveraging social media and cloud collaboration platforms for business, there are also risks that, if not managed properly, leave organizations vulnerable to business and legal risk… According to Osterman, sometimes takes a significant event to drive decision makers to action in the context of good information governance. For instance, a lawsuit in which an organization is not able to adequately respond to an eDiscovery order, or a regulator’s request for information that cannot be properly satisfied, will often move information governance from the back burner to a properly funded and executed initiative.

Finjan forms new subsidiary Finjan Blue to execute web security patent acquisition agreement with IBM

East Palo Alto, CA-based web security firm Finjan Holdings recently filed a Form 8-K with the U.S. Securities and Exchange Commission (SEC) which disclosed a patent assignment agreement made with Armonk, NY-based information technology giant IBM (NYSE:IBM). Under the terms of the agreement, Finjan Blue, a newly formed subsidiary of Finjan, will acquire a series of IBM security-related patents with potential pathways for the IBM and Finjan to work collaboratively on development of those patented technologies.

Finjan files patent infringement suit against Bitdefender as part of campaign to protect online security IP

Finjan asserts four patents in the case and alleges that Bitdefender’s marketing of antivirus, cloud and sandboxing technologies infringes upon the patents-in-suit. The case has been filed in the Northern District of California… Finjan’s suit against Bitdefender alleges that Bitdefender was presented with written notice of the alleged infringement of Finjan’s patents as early as February 2015. In October 2015, Finjan alleged that it discussed the ‘844, ‘154 and ‘494 patents with Bitdefender and how those patents read on technology practiced by Bitdefender. Despite numerous in-person and telephone meetings, Finjan alleges that that Bitdefender has continued to engage in willful and deliberate infringement of Finjan’s IP.

Staying Ahead of Privacy and Security Risks in the Internet of Things

In creating a privacy and security plan, IOT companies should be mindful of regulatory enforcement for failure to fully comply with their own advertised practices. For example, companies should honor representations made to consumers regarding privacy and security practices, or risk regulatory scrutiny. If not, the FTC may bring an enforcement action, which it did against IOT company, TRENDnet, Inc. According to the FTC, TRENDnet failed to implement reasonable security practices, monitor security vulnerability reports from third parties, test and review potential security vulnerabilities, and implement reasonable guidance for its employees, and thus was in violation of Section 5(a) of the FTC Act, 15 U.S.C. § 45(a). The case settled, and the terms of the settlement prohibited TRENDnet from misrepresenting its privacy and security practices and required it to establish a comprehensive security risk program.

Taking a Data-Centric Approach to Today’s Security Landscape

High value information—identified as trade secrets, IP mappings, product designs, financial data, confidential business information and similar files and documents—require an extra level of protection because of their value to cybercriminals and malicious insiders. The last thing an organization wants to do is make the theft of high value information easier by leaving vulnerability gaps in security practices. A malicious actor will exploit those each and every time.

Microsoft biometric ID systems enable highly functional lock screens, improved cybersecurity

Biometrics, or the measure of human physiological characteristics as expressed by data metrics, is becoming a much more valuable sector of high tech in recent months. By 2020, the global market for biometric systems should surpass $24.4 billion according to data released by Markets and Markets, with the sector growing at a compound annual growth rate (CAGR) of 17.5 percent between 2015 and 2020. Biometrics has applications in a couple of growing tech sectors, including e-commerce, e-passports and smartphones. Computer software and hardware developer Microsoft Corporation (NASDAQ:MSFT) of Redmond, WA, is looking to apply biometrics tech to its smartphone products.

Privacy and Security in the Age of the Driverless Car

The privacy implications of the driverless car are significant. The data that such a vehicle could collect and the potential uses of that data could be extraordinarily intrusive. Driverless cars could provide both historic and real-time, continuous geolocation data. Companies could utilize this data to determine not only your current location and destination but also every place that you have been. This data could lead to commercially valuable, but extremely sensitive and intimate information about individuals being discovered. Advertisers may be able to discern the purchasing patterns of individuals by tracking what stores they frequent. Insurers may be able to determine what the lifestyle of individuals is like by following their daily activities (e.g., constant trips to the gym) and dining habits (e.g., persistent trips to fast food restaurants).

The Top 10 Patent Applications of 2015

Innovation in the automotive sector was a huge story, both for the types of technologies being developed and the companies pursuing the R&D in that field. Drones and robotics also played a role in other top patent applications which we’re profiling today. Rounding out our list of top 2015 innovations includes an emotion analysis system for financial security, wireless charging schemes, low-power communications for wearable devices and a greenhouse window that can generate electricity while improving crop yield.

BoA innovations cover security for financial transactions, wearable payment devices, cryptocurrency

Many of the patents we noticed in our recent survey of BofA technologies are related to enhanced security methods for financial transactions, such as the innovation protected by U.S. Patent No. 9218596, entitled Method and Apparatus for Providing Real Time Mutable Credit Card Information. It discloses a smartcard apparatus having a microprocessor chip, a button, a dynamic transaction authorization number and a Bluetooth low energy device (BLE) that works to transmit an instruction to a smartphone for a request for a dynamic transaction authorization number when the button is depressed and receive the number from the smartphone; the smartcard further has a battery and a dynamic magnetic strip comprising a digital representation of the dynamic authorization number. This technology is designed to enhance security measures in smartcards having magnetic strips without requiring a banking institution to issue new cards. Enhanced security for banking transactions taking place on cloud infrastructures is featured within U.S. Patent No. 9184918, entitled Trusted Hardware for Attesting to Authenticity in a Cloud Environment. I

Cyber Security: How to Protect Your Data Over Wi-Fi

The same technology that makes it easy for you to stay in touch with the office also makes it easy for nefarious individuals to hack your communications and into our devices. Because office computers are generally connected to the same network if a hacker is able to gain access to one machine that shares the network connection they can potentially, and sometimes quite easily, gain access to all of the machines and information on the network. What this means is that computers on the same Wi-Fi network can potentially have access to any unencrypted information that pass through that network.