Court Battle over intellectual property theft

How to Stay Out of the Penalty Box

An acrimonious court case between two athletic gear companies provides strategies for discouraging intellectual property theft—and dealing with accusations when they arise.

Also see:

Security Blogs

Security Samurai

Typing on floppy disks: The worst education failure I've seen

Overly on Security

Hiding in plain view: Steganography

Lohrmann On GovSpace

The bad guys are getting more organized. Are we?

Digital ID World

The way the Internet is "supposed to be"

Movers & Shakers

Kaiser Permanente appoints Hoffman

 

Editor's Picks

No Junk Mail

E-mail Security

Here Comes Image Spam

Image spam—e-mail solicitations that use graphical images of text—is not new. But its rising sophistication has made much of it invisible to spam filters so that it now makes up one-third of all spam.

Full story »

Compass Awards: Business alignment

Compass Awards

Business Alignment

Recognizing the security profession's best and brightest. This year's theme is business alignment, and surely there is no theme of greater importance to CSOs.

Full story »

DNS: Definitely Not Safe?

Internet Security

DNS: Definitely Not Safe?

New attacks on the Internet’s domain name system keep CISOs guessing. Here’s what you can do about it.

Full story »

Metal Theft

Theft Trend

Copper: The Metal Theft Epidemic

Metal has never been more valuable, or more stolen. Find out about the metal theft epidemic and CSOs’ struggle to contain the problem.

Full story »

CSO Research Centers

CSO Resources/Tools

Security News

Pass It On

How to Prevent Workplace Violence

Prevention means staying alert to signals, encouraging employees to report potential problems and practicing response plans. Share these pointers with your HR and management teams.

Full story »

PODCAST

Security on the Couch

Too bad, says Bruce Schneier, we don't have separate words for security the mathematical reality and security the psychological feeling, because they are as distinct as air and water. At one time Schneier maligned the psychology of security, what he called security theater to make people feel safe even at the expense of being safe. But, as you'll hear in this podcast, the more he learns about the human brain, the more he's coming around to see value in security theater.

CSO Perspectives Conference

CSO Perspectives Conference

The Business Case for Security

March 18-20, 2007

The Broadmoor

Colorado Springs, Colorado

Join us at CSO Perspectives 2007, where you will have the opportunity to learn from top security executives about the process of building the business case for security.
Call (800) 366-0246 if you have any questions.

Click here for information on speakers, agenda and registration.

Application Firewalls -- No Longer Just "Nice To Have"
Complying with PCI Data Security Standard v1.1

sponsored by Citrix

In this Web seminar, you’ll learn the best way to protect your Web applications and achieve PCI compliance, with guidance from renowned application security experts Kurt Roemer and Mark Bouchard. Discover PCI-DSS system requirements, repercussions for noncompliance, how to prepare for new items in v1.1 of PCI-DSS (including Requirement 6.6: application code review or application layer firewall), and how to choose an application layer firewall to comply with PCI-DSS. View now.

View»

Whitepaper

The Convergence of Provisioning and Identity Auditing

sponsored by Sun Microsystems

The merging of cost, compliance, and online commerce as chief business concerns is driving the convergence of provisioning and identity auditing capabilities as well as the demand that such a converged solution be both sustainable and highly scalable. This paper will examine today's business drivers for the convergence of provisioning and identity auditing. Read on to learn more...

View»

Spying Scandal at Hewlett-Packard

CSO the magazine

You may qualify for a FREE subscription to our print magazine, the Resource for Security Executives



 

 

advertisement