Thursday, January 15, 2009

Avoid conflicts over intellectual property

Lessons from the case of AMS vs. Gagnon
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Alcatel-Lucent
rule

SOA Governance and Compliance
Hear about the latest industry trends around new heightened information security regulations in this on-demand Webcast featuring Andreas Antonopoulos from Nemertes Research. Get solutions that reduce your company's risk and allows you to better manage your environment. Watch now.

rule

Spotlight Story
Avoid conflicts over intellectual property

M. E. Kabay By M. E. Kabay
As I continue my research on intellectual property law developments in 2008, I came across an interesting (and sad) case that stimulated ideas that may be useful for both consultants and clients working together on software development. Since the Parkerian Hexad explicitly includes control or possession as one of the fundamental security attributes of information, I'll give you the facts and my interpretation in one exceptionally long column today. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Podcast: 5 Ways Employees can Sabotage Your Network With a poor economy and layoffs looming at a company, the most trusted employees can often turn and become an insider threat. Tim Connelly from Netcordia discusses five different ways that they can attack your network as a way for revenge or even profit (from data theft). (7:36)

The 5 Most Dangerous Security Myths Still think that today's computer viruses and other malware come from some maladjusted teen out to vandalize your PC to make a name for himself? Think again. The persistent myth is a holdover from days long gone, and it's important to dispel it if you want to know what you're up against - and how to protect yourself.

The 5 Most Dangerous Security Myths: Myth #2 Sure, the Web is today's Wild West, with digital guns blazing and no sheriff in sight. But as long as you use a good antivirus program, you're completely safe, right?

The 5 Most Dangerous Security Myths: Myth #3 When the Web was young and blink tags abounded, it wasn't hard to avoid the bad stuff online. You could generally tell by looking at a site if it was unsavory or even dangerous, and if you were careful with your surfing and your e-mail, you could generally have gone without antivirus.

The 5 Most Dangerous Security Myths: Myth #4 It's a beloved phrase, used by the wise and the lazy alike in response to everything from potential construction to technical work: "If it ain't broke, don't fix it."

The 5 Most Dangerous Security Myths: Myth #5You've cleared away most of the web of myth. You know that today's evil viruses and other malware exist to make money, that antivirus alone is no guarantee of safety, and that neither is your own good sense (as important as that is). And you know that some of the best protection comes from keeping your software and your operating system up-to-date.

Asked & Answered: PKI A reader asks, "Can you explain me the public key infrastructure in detail or reference any book with detailed explanation over PKI?" See expert Ron Nutter's answer in today's IT Asked & Answered.

Stop data leaks Yes, you can keep sensitive data from leaving your organization. Our revamped Product Guide tells you what you need to know, including 5 questions to ask data-leak protection vendors before buying.

January giveaways from Cisco Subnet and Microsoft Subnet
Up for grabs: Two Cisco training courses from Skyline-ATS worth up to $6,990, a Microsoft training course from New Horizons worth up to $2,500, 15 copies each of the hot book titles Microsoft SQL Server 2008 Management and Administration, IPv6 Security and Chained Exploits: Advanced Hacking Attacks. Get all the entry details here.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Alcatel-Lucent
rule

SOA Governance and Compliance
Hear about the latest industry trends around new heightened information security regulations in this on-demand Webcast featuring Andreas Antonopoulos from Nemertes Research. Get solutions that reduce your company's risk and allows you to better manage your environment. Watch now.

rule

Effectively Managing Change.
Find the right network/system management platforms that leverage the latest IT technologies in this Executive Guide, "The New Network/System Management Challenges." Get a handle on server sprawl, managing 802.11n wireless LANs, and data center automation tool integration. Confidently deploy innovative technologies that drive efficiencies today.
Download this Executive Guide now.


Executive Guide: Green IT
Download this Network World Executive Guide, "Going Green: Trends, tips and case studies," for timely, real-world advice. By adopting an effective green approach to IT you'll save your company money and even bolster company profits.
Find out how to make it happen today.

 

01/15/09

Today's most-read stories:

  1. The big Windows 7 problem: XP holdouts
  2. Nortel board of directors vote to file bankruptcy
  3. Why Windows 7 will crush Linux
  4. Beast hiding in Microsoft Patch Tuesday vulnerability
  5. Recession helps send more CEOs to the exits
  6. Telescammers to fork over $50 million in restitution
  7. Outlook '09
  8. Windows 7 beta shows off task bar, UI goodies
  9. Solving Obama's BlackBerry dilemma
  10. Top 25 software screw-ups


The Evolution of Network Security
Zero in on the hottest security technologies you need to know about in this Executive Guide. Better protect your IT environment with NAC, data leakage prevention controls and auditing tools.
Learn more.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment