News & Analysis as of

Cyber Espionage Trade Secrets Critical Infrastructure Sectors

Troutman Pepper

U.S. Responding To Cyber-Espionage: White House Acknowledges Increasing Threat

Troutman Pepper on

No longer cut from the cloth of 007’s expensive suits, fast cars or well-mixed drinks, present-day espionage is carried out, to a great extent, through computer screens, proxy servers and spoofed e-mail addresses. Dubbed...more

McDermott Will & Emery

Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets

The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance. Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities...more

BakerHostetler

APT Threat Report Shows Cybersecurity Risks Not Limited to Identity Theft

BakerHostetler on

We often talk to companies who believe they are an unlikely target for hackers because they do not have financial account information, Social Security numbers, or medical information. However, personal information is not the...more

3 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide