|How do you perform on a test that checks if you can leak sensitive intellectual property (such as source code)? |
How are we testing?:
This test checks to see if your security solution can detect and block an attempt to leak sensitive data that matches patterns of source code.
Why is this test important?:
Stealing your intellectual property is the goal of some of the world's most dangerous hackers, from criminals motivated by profit to state actors seeking competitive advantage for their industries. A leak of intellectual property has profound consequences for your enterprise - from needing to rewrite source code, for example, to re-issuing binaries.
Is Your Intellectual Property Lost in the Cloud?
32% of companies surveyed lost data from the cloud. Security firm Symantec found its source code for Norton Utilities 2006 posted to the Pirate Bay, a controversial peer-to-peer file sharing website. Unfortunately for the company, this occurrence was not the first time it's happened. Source
|In the News:|
24 Jul 2017
Research shows most security pros would disable security to allow employees more freedom to get their work done.
24 Jul 2017
Although all forms of intellectual property can lose value when they are not properly looked after, no category of IP can lose its value as quickly as material that—with just a bit of attention from a business lawyer— can qualify for state and ...
13 Jul 2017
Cyberespionage conjures up nightmare scenarios for private and public organizations. For governments, it might involve the prospect of foreign agents filching details on a new missile system. For an auto company, it could be hackers stealing their ...