Cyber Espionage Cybersecurity

News & Analysis as of

[Webinar] The New Compliance Challenge: Protecting Confidential Assets From Cyber Threats and Malicious Insiders - Nov. 5th,...

The growing prevalence of cyber-security issues and insider breaches has put information security squarely on the agenda for many corporations – and increasingly in the realm of compliance. In this webinar, we discuss these...more

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

US China Trade War

The October blog post will be broken up into two parts. This October 15th post will comment on the TPP Agreement signed today and well as President Xi Jinping’s recent trip to the US and my impressions from Beijing, China...more

Trade & Manufacturing - October 2015

Ending the Crude Oil Export Ban - On September 17, the House Energy and Commerce Committee passed a bill to end the 40-year-old ban on the export of domestic crude oil. The Committee vote was passed by a Republican...more

Trade & Manufacturing - News of Note - October 2015

President Xi's State Visit Brings Announcements on Cybersecurity and Climate Change - In late September, Chinese President Xi Jinping made his first state visit to the United States. Cybersecurity and climate change...more

U.S., China Announce Cybersecurity Agreement During Xi Jiping’s Visit

Chinese President Xi Jinping made his first state visit to the United States last week, and his itinerary included meetings with U.S. technology company leaders as well as President Barack Obama. Not surprisingly, his hosts...more

Project CAMERASHY Details Cyberespionage By China’s Military

In a story reminiscent of a Tom Clancy plot, the Wall Street Journal reported last Thursday on “meticulously documented” cyberespionage conducted by China’s People’s Liberation Army (“PLA”) Unit 78020 to further strategic...more

US-China Cyber Deal Big on Promises, Short on Action

In the aftermath of recent cyberattacks attributed to China’s government and citizens, many observers prepared for a rather uncomfortable state visit by Chinese President Xi Jinping last week. Then, as President Xi began his...more

[Webinar] Sports, Spies and Hacks: Protecting Confidential Information - August 27th, 12:00pm EDT

Sports teams are the latest targets for data breaches. The stakes are high – confidential scouting reports, data about players, prospects and trade talks represent the ultimate trade secrets, the crown jewels that if exposed,...more

Hacking Your Rivals – Corporate Espionage in Major League Baseball

As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more

Executive Order Authorizes Sanctions against Cybercriminals

Citing cyberthreats as one of the most serious economic and national security challenges to the U.S., President Obama recently issued an executive order (EO) authorizing the use of economic sanctions against those who...more

New US sanctions program to combat cybercrimes: 3 action steps for tech companies

The new sanctions in President Barack Obama’s Executive Order 13694 of April 1, 2015, “Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities,” target individuals and...more

Data Security Compliance and APTs: New Insights from "Putter Panda"

On Monday, the data security firm CrowdStrike released a new report pointing a digital finger at the Chinese Army for cyber espionage against western technology companies. It has long been known that some of the most serious...more

United States Charges China with Cyber-Espionage in Unprecedented Indictment

This morning, the U.S. Department of Justice (DOJ) announced that a grand jury in the Western District of Pennsylvania has indicted five Chinese military officials on charges of computer hacking, economic espionage, and...more

United States v. China: The Battle over Cyber-Espionage Results in Criminal Charges

For those of us who have been active in cybersecurity, it is a well known fact that the Chinese government, acting through its military, has been the most prolific global perpetrators of cyber-espionage. Over the past several...more

Verizon’s Data Breach Report Reveals The Nine Most Pressing Corporate Security Threats

As April comes to a close, it’s time once again for Verizon Enterprise Solutions’ Data Breach Investigations Report to remind us just how important data security is to the corporate world. Released Wednesday, the report,...more

Cyber Espionage And Insurance Coverage

In the United States alone, it is estimated that the cost of “[c]yber-espionage and other malicious cyber crimes...[i s] between $24 billion and $120 billion annually.” In 2008, the U.S. Department of Defense’s classified...more

A Weapon Against Hackers on Home Front

Over the past year the national press has repeatedly reported on the vulner­ability of our intellectual property to nation-state hackers like China, which have reportedly accessed and stolen highly con­fidential data by...more

Pols Gone Wild: Congress Discovers Trade Secret Theft And Cybersecurity Are Problems; We Sort Through The Explosion Of Legislation

Trade secret theft and cybersecurity are hot topics in Congress these days, spawning legislative initiatives left and right....more

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets

The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance. Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities...more

Obama Administration Trade Secret Report Raises Important IP, Business, and Securities Issues

The Obama Administration’s recent “Strategy on Mitigating the Theft of U.S. Trade Secrets” makes clear the importance for businesses to be aware of and understand the international threats to their intellectual property, the...more

APT Threat Report Shows Cybersecurity Risks Not Limited to Identity Theft

We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more

IP Alert: White House Launches Effort to Curb Trade Secret Misappropriation

On February 20, 2013, the White House issued a report outlining a new plan to combat trade secret theft from U.S. businesses. Faced with the escalating theft of U.S. trade secrets and noting “the crucial role of trade...more

24 Results
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.