Posts Tagged: "security"

Effective data management and governance for social media and cloud collaboration platforms

While there are a lot of irreplaceable benefits to leveraging social media and cloud collaboration platforms for business, there are also risks that, if not managed properly, leave organizations vulnerable to business and legal risk… According to Osterman, sometimes takes a significant event to drive decision makers to action in the context of good information governance. For instance, a lawsuit in which an organization is not able to adequately respond to an eDiscovery order, or a regulator’s request for information that cannot be properly satisfied, will often move information governance from the back burner to a properly funded and executed initiative.

Finjan forms new subsidiary Finjan Blue to execute web security patent acquisition agreement with IBM

East Palo Alto, CA-based web security firm Finjan Holdings recently filed a Form 8-K with the U.S. Securities and Exchange Commission (SEC) which disclosed a patent assignment agreement made with Armonk, NY-based information technology giant IBM (NYSE:IBM). Under the terms of the agreement, Finjan Blue, a newly formed subsidiary of Finjan, will acquire a series of IBM security-related patents with potential pathways for the IBM and Finjan to work collaboratively on development of those patented technologies.

Finjan files patent infringement suit against Bitdefender as part of campaign to protect online security IP

Finjan asserts four patents in the case and alleges that Bitdefender’s marketing of antivirus, cloud and sandboxing technologies infringes upon the patents-in-suit. The case has been filed in the Northern District of California… Finjan’s suit against Bitdefender alleges that Bitdefender was presented with written notice of the alleged infringement of Finjan’s patents as early as February 2015. In October 2015, Finjan alleged that it discussed the ‘844, ‘154 and ‘494 patents with Bitdefender and how those patents read on technology practiced by Bitdefender. Despite numerous in-person and telephone meetings, Finjan alleges that that Bitdefender has continued to engage in willful and deliberate infringement of Finjan’s IP.

Staying Ahead of Privacy and Security Risks in the Internet of Things

In creating a privacy and security plan, IOT companies should be mindful of regulatory enforcement for failure to fully comply with their own advertised practices. For example, companies should honor representations made to consumers regarding privacy and security practices, or risk regulatory scrutiny. If not, the FTC may bring an enforcement action, which it did against IOT company, TRENDnet, Inc. According to the FTC, TRENDnet failed to implement reasonable security practices, monitor security vulnerability reports from third parties, test and review potential security vulnerabilities, and implement reasonable guidance for its employees, and thus was in violation of Section 5(a) of the FTC Act, 15 U.S.C. § 45(a). The case settled, and the terms of the settlement prohibited TRENDnet from misrepresenting its privacy and security practices and required it to establish a comprehensive security risk program.

Taking a Data-Centric Approach to Today’s Security Landscape

High value information—identified as trade secrets, IP mappings, product designs, financial data, confidential business information and similar files and documents—require an extra level of protection because of their value to cybercriminals and malicious insiders. The last thing an organization wants to do is make the theft of high value information easier by leaving vulnerability gaps in security practices. A malicious actor will exploit those each and every time.