|How do you perform on a test that checks if you can leak sensitive intellectual property (such as source code)? |
How are we testing?:
This test checks to see if your security solution can detect and block an attempt to leak sensitive data that matches patterns of source code.
Why is this test important?:
Stealing your intellectual property is the goal of some of the world's most dangerous hackers, from criminals motivated by profit to state actors seeking competitive advantage for their industries. A leak of intellectual property has profound consequences for your enterprise - from needing to rewrite source code, for example, to re-issuing binaries.
Is Your Intellectual Property Lost in the Cloud?
32% of companies surveyed lost data from the cloud. Security firm Symantec found its source code for Norton Utilities 2006 posted to the Pirate Bay, a controversial peer-to-peer file sharing website. Unfortunately for the company, this occurrence was not the first time it's happened. Source
|In the News:|
23 Mar 2017
SSL said it contacted Orbital ATK with questions about the data breach, including which Orbital ATK employees viewed the documents and whether Orbital ATK still had them. Orbital ATK ... We have to protect our intellectual property.” “It's an unusual ...
20 Mar 2017
In reality, should the vendor fail to adequately provide the services or if the contract is breached, it's likely that the impact and cost will far exceed the vendor's default cap. Set the cap at a high multiple of the contract value and do not allow ...
01 Mar 2017
While financial and healthcare institutions seem to own the headlines as it relates to data breaches, manufacturers hold an incredible amount of intellectual property, making the industry a prime target. In fact, it has come to light that in early 2016 ...