The Business-Technology Weave:

intellectual property


July 11, 2011  12:32 PM

Pre-Infected Components and Software Entering the U.S.?

Posted by: David Scott
anti-virus, botnet, computer inspection, computer survey, computer virus, intellectual property, keystroke logging, keystroke monitoring, malware, pre-infected components, security defeats, software import, spyware, virus, virus removal


According to a top Homeland Security official, testifying before a hearing...

December 28, 2010  11:55 AM

You don’t know what you don’t know

Posted by: David Scott
business plans and policy, business security, content management, content security, data security, enterprise resource management, enterprise resource planning, enterprise security, information systems, intellectual property, intellectual property security, IT security, MIS, security policyi and plans


When securing information, intellectual property, data (hard and soft, paper...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: