|How do you perform on a test that checks if you can leak sensitive intellectual property (such as source code)? |
How are we testing?:
This test checks to see if your security solution can detect and block an attempt to leak sensitive data that matches patterns of source code.
Why is this test important?:
Stealing your intellectual property is the goal of some of the world's most dangerous hackers, from criminals motivated by profit to state actors seeking competitive advantage for their industries. A leak of intellectual property has profound consequences for your enterprise - from needing to rewrite source code, for example, to re-issuing binaries.
Is Your Intellectual Property Lost in the Cloud?
32% of companies surveyed lost data from the cloud. Security firm Symantec found its source code for Norton Utilities 2006 posted to the Pirate Bay, a controversial peer-to-peer file sharing website. Unfortunately for the company, this occurrence was not the first time it's happened. Source
|In the News:|
28 Apr 2017
... these attacks are to obtain sensitive personally identifiable information or proprietary information/intellectual property, he explains. For attacks aimed at educational institutions, valuable research data is the target (see: Analysis: Verizon's ...
28 Apr 2017
The company released its Data Breach Investigations Report Thursday, which shows that cyberespionage is the most common attack against manufacturing, education and the public sector. The report analyzed 42,068 incidents and 1,935 breaches globally, ...
27 Apr 2017
Understandably, the hospitality industry sees a lot of point of sale breaches (most commonly by organised crime), while the education sector is often targeted by "state-affiliated actors" seeking intellectual property or personal information about ...