|How do you perform on a test that checks if you can leak sensitive intellectual property (such as source code)? |
How are we testing?:
This test checks to see if your security solution can detect and block an attempt to leak sensitive data that matches patterns of source code.
Why is this test important?:
Stealing your intellectual property is the goal of some of the world's most dangerous hackers, from criminals motivated by profit to state actors seeking competitive advantage for their industries. A leak of intellectual property has profound consequences for your enterprise - from needing to rewrite source code, for example, to re-issuing binaries.
Is Your Intellectual Property Lost in the Cloud?
32% of companies surveyed lost data from the cloud. Security firm Symantec found its source code for Norton Utilities 2006 posted to the Pirate Bay, a controversial peer-to-peer file sharing website. Unfortunately for the company, this occurrence was not the first time it's happened. Source
|In the News:|
22 Jun 2017
While much of the survey explored deliberate threats and attacks, survey respondents were more concerned about accidental breaches or data leaks (71 percent) and negligent breaches (69 percent) than malicious breaches (61 percent). The rise of social ...
21 Jun 2017
And of course, there's the security—or, rather, the total lack of security. As a contractor, Deep Root had an obligation to protect the RNC's intellectual property, as well as the intellectual property of the other research firms from which Deep Root ...
20 Jun 2017
However, today companies have to factor in indirect costs like impact on continuing operations and integrated value chain, loss of customers, increase in cyber risk premiums (if taken), loss of intellectual property and some times credit ratings. Both ...