Current DLP solutions rely on text pattern recognition to detect sensitive data and prevent data loss. But how can that protect images, digital media and other high value assets? If DLP could protect digital media, the 2009 leak of X-Men Origins: Wolverine would not have happened. Adding in a recognizable pattern or watermark is one Read more…
Tags: Data Protection, DLP, intellectual property, IP, McAfee Data Loss Prevention
Many global organizations operate in highly competitive markets, including countries known to aggressively target intellectual property. A significant amount of sensitive information, including intellectual property (IP) resides in enterprise resource planning (ERP) systems such as SAP and Oracle. Traditionally, the security around this information has been limited to the capabilities of the ERP system through Read more…
Tags: Data Protection, DLP, enterprise resource planning, ERP, intellectual property, IP, McAfee Data Loss Prevention, Saviynt Access Manager
Eugene Kaspersky has weighed in this week on Shady RAT, criticizing McAfee for exposing an operation that attacked a wide range of companies, governments, and nonprofit organizations across 14 countries and numerous sectors of the economy. Among other things, Kaspersky says he doesn’t believe it was a sophisticated attack and that our approach is alarmist. He’s missing Read more…
Tags: Advanced Persistent Threat, attacks, critical infrastructure, intellectual property, Shady RAT
Something Changed With Aurora Even before the China centered Operation Aurora attack (a.k.a. Google attacks) in which hackers broke into numerous high-profile organizations in the US to steal highly confidential information, I had been warning customers (and anyone in ear shot quite frankly) of the most effective strategies to protect against the deluge of advanced Read more…
Tags: data breach, database activity monitoring, database security, enterprise, intellectual property, Night Dragon, Operation Aurora, Sentrigo acquisition
During last month’s #SecChat, many issues around mobile security were raised and many open questions still remain unanswered. The discussion brought up some key points on securing mobile devices with more than 35 contributors tweeting over 230 #SecChat hashtag mentions. When talking about the best practices for IT security regarding mobile devices, it was a Read more…
Tags: intellectual property, Mobile, mobile security, security
Operation Aurora continues to be a hot topic inside and outside of security circles. At this week’s RSA Conference in San Francisco many conversations are on the topic of the attacks that hit Google and dozens of other companies in January. During a talk this afternoon Stuart McClure and I discussed how the attackers in Read more…
Tags: Cybercrime, intellectual property, kurtz, Operation Aurora, Risk and Compliance
Posts tagged under intellectual property