6 Key Takeaways | Criminal Trade Secret Theft
Washington Post Journalist Jason Rezaian on His Iranian Imprisonment
Compliance Perspectives: The FBI on Why and How to Work with the Office of the Private Sector
The DFIR 2025 Threat Report from CyberCX offers a firsthand view of how cyber adversaries adapted and accelerated their tactics in 2024. Covering incidents across Australia, New Zealand, North America, and Europe, the report...more
Protecting trade secrets in any business is critical, but the stakes are higher in life sciences. Given the high focus on innovation in the industry, corporate espionage can result in devastating financial and reputational...more
On August 7, 2024, the 6th Circuit upheld a Chinese spy’s twenty-year prison sentence for attempting to steal aviation trade secrets from General Electric (GE). Yanjun Xu, a deputy director in China’s Ministry of State...more
Topic Links Maritime trade is essential to America's economic viability and national security interests. The U.S. Marine Transportation System (MTS) – comprising an intricate system of ports, terminals, vessels, waterways and...more
Editor's Note: In a historic and bold move, the U.S. government has implemented unprecedented sanctions against the Intellexa Consortium and its key figures for their roles in deploying spyware that jeopardizes privacy and...more
On February 28, 2024, President Biden announced that he was issuing an Executive Order (the "EO") directing the promulgation of regulations to limit the dissemination of "bulk sensitive personal data" and "United States...more
According to recent reports issued by Microsoft and U.S. government agencies, hackers recently exploited a gap in Microsoft’s cloud environment, enabling the malicious actors to access the email accounts of employees at the...more
Briefing on a motion for preliminary injunction is complete in the lawsuit filed to strike Florida Senate Bill 264, Chapter No. 2023-33, Laws of Florida (the Act), which limits select persons from "foreign countries of...more
Chinese lawmakers approved revisions to the country’s counterespionage law on 23 April 2023, broadening the definition of spying and banning the transfer of any information related to national security interests (which are...more
The Second Session of the Standing Committee of the 14th National People’s Congress voted and passed on April 26, 2023 the newly revised “Anti-Espionage Law of the People’s Republic of China” (the New Anti-Espionage Law). The...more
The term “metaverse” first appeared in 1992 as an abstract concept in Neal Stephenson’s dystopian novel Snow Crash. Two decades later, the Metaverse has since evolved from a mere idea to a figment of everyday reality, as it...more
Prestige Ransomware Emerges, Targets Ukraine and Poland - A new ransomware variant has emerged in the wild, being used in targeted attacks against the logistics and transportation sectors within Ukraine and Poland. The...more
What: The Transportation Security Administration (TSA) has issued two Security Directives aimed at passenger and freight railroad cybersecurity, continuing the government’s move to an increasingly regulatory approach to...more
1. New Cybersecurity Export Controls From BIS Go Into Effect in January - The Bureau of Industry and Security (BIS) has released an interim final rule establishing new export controls on certain cybersecurity items and...more
On July 19, 2021, the Biden administration, along with a group of allies publicly accused the Chinese government of malicious cyber activities and irresponsible state behavior. The joint announcement states the U.S....more
On April 15, 2021, following discussions just days earlier of a potential summit between President Biden and Russian President Putin and as Russian troops amassed along the Ukrainian border, the Biden Administration issued...more
Federal government lessees seeking to occupy high-security spaces in foreign-owned buildings will be required to obtain complete beneficial ownership and impose access restrictions on owners and property managers. The...more
Report on Supply Chain Compliance 3, no. 18 (September 17, 2020) - In June of 2020, Trustwave SpiderLabs, a cybersecurity firm, announced it had found malware on tax software downloaded by a client. The malware was embedded...more
Report on Supply Chain Compliance 3, no. 14 (July 23, 2020) - Following a deadly clash between Indian and Chinese forces along the Himalayan border area, India’s government decided on June 29 to ban 59 Chinese apps. The...more
A few weeks ago, the Department of Justice (DOJ) asked the D.C. Circuit for panel rehearing and rehearing en banc of its ruling in American Federation of Government Employees v. OPM, 928 F.3d 42 (D.C. Cir 2019), decided last...more
In concluding that the Foreign Sovereign Immunities Act (FISA) exception for non-commercial torts does not abrogate sovereign immunity where the claimed espionage did not occur entirely in the United States, the US Court of...more
You may have missed it this past weekend, but reports indicate the United States is considering sanctioning Chinese companies and individuals who have benefited from their government’s alleged cyber hacking of U.S. trade...more
As we approach the dog days of summer, baseball season is again in full bloom. We previously discussed old-fashioned sign stealing in the context of teams trying to gain a competitive advantage during an actual game. But it...more
Trade secret theft knows no borders in an age of cybertheft and global corporate espionage....more
Every day the headlines report another Fortune 500 company suffering a hacking incident. For companies, the hack itself creates substantial risks of economic devastation caused by the theft of valuable trade secrets. Add to...more