TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

Insider Risk: Theft of Trade Secrets Nets Thief Six Months

An interesting case of insider risk wrapped up recently in the Federal District Court in Massachusetts when U.S. Senior District Court Judge William G. Young handed down a lenient sentence to Haoyang ...
Security Boulevard

There’s Another Global Pandemic We’re Not Talking About

Coronavirus and election meddling may scare you, but nation state IP theft can “kill” your business or university. The post There’s Another Global Pandemic We’re Not Talking About appeared first on Radware ...
Think Cybersecurity Insurance Will Save You? Think Again.

Think Cybersecurity Insurance Will Save You? Think Again.

By this point, we know that state-sponsored cyber attacks are a thing. Time and again, we see headlines to this effect, whether it’s election hacking, IP theft, or mega-breaches. For your average ...
Chinese Spy Jerry Chun Shing Lee

Chinese MSS Officer Extradited to U.S. from Belgium

In what can only be described as a rarity, a very senior Chinese intelligence officer was arrested in Belgium and extradited to the United States, where he was indicted by the Department ...
Security Boulevard
DUMPS vulnerabilities hybrid SOC

New Tariffs Expected to Increase Hacks on Intellectual Property

Could a trade war create a spike in hacking attempts? That’s the concern of cybersecurity professionals, who believe that the proposed new tariffs instituted by the United States will lead to an ...
Security Boulevard

Cyber espionage hits the baseball diamond

From the time sensitive information was first maintained on computer networks, organizations have tried to infiltrate those networks to gain an advantage over their competition. Cases of industrial espionage have cropped up ...

Cyber espionage hits the baseball diamond

From the time sensitive information was first maintained on computer networks, organizations have tried to infiltrate those networks to gain an advantage over their competition. Cases of industrial espionage have cropped up ...

Why managing information security as a business risk is critical, part 3: Intellectual property

Part III: Intellectual property In the previous installments of this series, we covered the direct financial impact and reputational fallout—both for organizations and information security professionals—that can result from data breaches. A ...

Why managing information security as a business risk is critical, part 3: Intellectual property

Part III: Intellectual property In the previous installments of this series, we covered the direct financial impact and reputational fallout—both for organizations and information security professionals—that can result from data breaches. A ...