• Economic Espionage Charges Dropped Against Tech Employees

    Two fitness tech companies, FitBit and Jawbone, went head to head over the past decade. Jawbone debuted its fitness bracelet in 2011, FitBit came out with one in 2013. FitBit took a bigger market share and had...

    • Posted 24 hours ago
    • 0
  • Scattershot Regulation Of Biometrics

    Advances in biometrics technology are rapidly finding their way into many industries – automotive, travel, security, health care, insurance and financial services, among others – with impressive results but also some predictable privacy concerns. Some insurance companies...

    • Posted 2 days ago
    • 0
  • Secure Sharing Of Files Online

    A brief look at some off-the-shelf options for sending files and documents over the internet. All seven platforms reviewed here encrypt, but only one of them is not able access the files itself. All the others “retain...

    • Posted 1 week ago
    • 0
  • AI and ML Patents By the Numbers

    The U.S. Patent and Trademark Office granted 14,838 patents that mentioned artificial intelligence or machine learning in 2019, roughly double the issuance in 2018, writes Al AuYeung, an IP attorney at Schwabe, Williamson & Wyatt. The average...

    • Posted 2 weeks ago
    • 0
  • A Trade Secret Wake-Up Call

    They are not easy to define, much less protect. Protecting trade secrets is both a technical issue and a managerial issue, and both require ongoing attention. One perennial problem is maintaining a trusting and collegial ambience within...

    • Posted 2 weeks ago
    • 0
  • Phishing Has Succeeded At More Than Half Of U.S. Organizations

    More than half of U.S. organizations were successfully phished in 2019, meaning they lost data, faced a credential or account compromise, or a ransomware...

    • Posted 2 weeks ago
    • 0
  • Advanced Ransomware Infects Backups Too

    Ransomware, said in this article to be among the easiest threats to control (avoid opening suspicious emails) has an insidious offshoot. It’s been dubbed “wiperware” by security specialists; some call them “wiper worms.” These are sophisticated programs...

    • Posted 4 weeks ago
    • 0
  • New Ransomware Threat: We’ll Broadcast Data You Won’t Buy Back

    Purveyors of a strain of malware called Maze Ransomware have added another term to their extortion deal. Not only will they freeze your computers if you don’t pay up, they will start publishing your data. This ploy...

    • Posted 2 months ago
    • 0
  • A Fresh Look At Japanese Trade Secret Protection

    Countries throughout East Asia have been feeling the sting of trade secret misappropriation and updating their respective trade secret protection regimes. In Japan, lawmakers responded by enacting amendments to a broader Unfair Competition Prevention Act. A recent...

    • Posted 2 months ago
    • 0
  • Managing Mountains of Data: Q&A with H5

    Identifying and retaining data that has business value is critical, but that same data can pose risks. Today’s General Counsel interviewed Sheila Mackay and Karla Wehbe of the technology services firm H5 on how to manage these...

    • Posted 2 months ago
    • 0
Do NOT follow this link or you will be banned from the site!