The Business-Technology Weave:

intellectual property

1

July 11, 2011  12:32 PM

Pre-Infected Components and Software Entering the U.S.?



Posted by: David Scott
anti-virus, botnet, computer inspection, computer survey, computer virus, intellectual property, keystroke logging, keystroke monitoring, malware, pre-infected components, security defeats, software import, spyware, virus, virus removal

 

According to a top Homeland Security official, testifying before a hearing...

December 28, 2010  11:55 AM

You don’t know what you don’t know



Posted by: David Scott
business plans and policy, business security, content management, content security, data security, enterprise resource management, enterprise resource planning, enterprise security, information systems, intellectual property, intellectual property security, IT security, MIS, security policyi and plans

 

When securing information, intellectual property, data (hard and soft, paper...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: