<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Trade Secrets and Intellectual Property</title>
	<atom:link href="http://www.gfi.com/blog/trade-secrets-intellectual-property/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=trade-secrets-intellectual-property</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 09 Aug 2013 12:13:46 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/comment-page-1/#comment-29436</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 01 Aug 2011 11:04:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3353#comment-29436</guid>
		<description><![CDATA[Tana brings up a very good point. Users should be aware that having some access denied, if they do not really need that access, is actually a good thing for them and the company. 

If an attacker were to compromise their account, possibly even through no fault of their own, and with that manages to damage the company, they will be in for trouble. They will be investigated and their security practices will be questioned. 

Users should indeed, as Tana rightfully mentioned, just ensure they get the access that they need to get their job done. Anything else just exposes them and the company to unnecessary risks.]]></description>
		<content:encoded><![CDATA[<p>Tana brings up a very good point. Users should be aware that having some access denied, if they do not really need that access, is actually a good thing for them and the company. </p>
<p>If an attacker were to compromise their account, possibly even through no fault of their own, and with that manages to damage the company, they will be in for trouble. They will be investigated and their security practices will be questioned. </p>
<p>Users should indeed, as Tana rightfully mentioned, just ensure they get the access that they need to get their job done. Anything else just exposes them and the company to unnecessary risks.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tana</title>
		<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/comment-page-1/#comment-29419</link>
		<dc:creator>Tana</dc:creator>
		<pubDate>Fri, 29 Jul 2011 08:02:08 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3353#comment-29419</guid>
		<description><![CDATA[Internal regulations that divide access and use the least privilege principle can help. In one of my previous jobs where I wasn&#039;t a programmer and I didn&#039;t need access to the source code, I explicitly asked not to be given one. Can you imagine how shocked my bosses were when they heard my motives? 
All the cases which Emmanuel lists are good examples of what happens when you have a Trojan horse inside.]]></description>
		<content:encoded><![CDATA[<p>Internal regulations that divide access and use the least privilege principle can help. In one of my previous jobs where I wasn&#8217;t a programmer and I didn&#8217;t need access to the source code, I explicitly asked not to be given one. Can you imagine how shocked my bosses were when they heard my motives?<br />
All the cases which Emmanuel lists are good examples of what happens when you have a Trojan horse inside.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/comment-page-1/#comment-29336</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Fri, 08 Jul 2011 14:20:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3353#comment-29336</guid>
		<description><![CDATA[Thanks for bring that story to our attention Elaine, personally I have not heard of the case, guess it&#039;s too fresh.

Thanks again!]]></description>
		<content:encoded><![CDATA[<p>Thanks for bring that story to our attention Elaine, personally I have not heard of the case, guess it&#8217;s too fresh.</p>
<p>Thanks again!</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Elaine Tjom</title>
		<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/comment-page-1/#comment-29328</link>
		<dc:creator>Elaine Tjom</dc:creator>
		<pubDate>Thu, 07 Jul 2011 12:43:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3353#comment-29328</guid>
		<description><![CDATA[This type of theft is the worst. It can surely kill a business. Just recently, CME Group filed a case against one of their senior programmers. The programmer was Chunlai Yang. He was arrested just last week. He worked for CME for more than 10 years.

CME said Chunlai Yang illegally downloaded source codes of their software. They suspect that he is selling the source codes to China. This case is still under investigation by the FBI.]]></description>
		<content:encoded><![CDATA[<p>This type of theft is the worst. It can surely kill a business. Just recently, CME Group filed a case against one of their senior programmers. The programmer was Chunlai Yang. He was arrested just last week. He worked for CME for more than 10 years.</p>
<p>CME said Chunlai Yang illegally downloaded source codes of their software. They suspect that he is selling the source codes to China. This case is still under investigation by the FBI.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Vivian Wee</title>
		<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/comment-page-1/#comment-29319</link>
		<dc:creator>Vivian Wee</dc:creator>
		<pubDate>Wed, 06 Jul 2011 07:34:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3353#comment-29319</guid>
		<description><![CDATA[Trade secrets and intellectual properties are what keep businesses apart. We can&#039;t drink the same testing cola, can&#039;t use the same kind of laundry detergent, etc. Pepsi is Pepsi - Coke is Coke. The taste of Coke is what it identifies itself.

As consumers, we need diversity to what product or service we will use. We&#039;re always looking for different things. And if some breaks this diversity by sharing trade secrets and IPs, we can&#039;t differentiate Coke from Pepsi. We&#039;ll all be using the same things.

Trade / IP theft is not new anymore. But these days, they&#039;re more sinister than before.]]></description>
		<content:encoded><![CDATA[<p>Trade secrets and intellectual properties are what keep businesses apart. We can&#8217;t drink the same testing cola, can&#8217;t use the same kind of laundry detergent, etc. Pepsi is Pepsi &#8211; Coke is Coke. The taste of Coke is what it identifies itself.</p>
<p>As consumers, we need diversity to what product or service we will use. We&#8217;re always looking for different things. And if some breaks this diversity by sharing trade secrets and IPs, we can&#8217;t differentiate Coke from Pepsi. We&#8217;ll all be using the same things.</p>
<p>Trade / IP theft is not new anymore. But these days, they&#8217;re more sinister than before.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Christian Gregory</title>
		<link>http://www.gfi.com/blog/trade-secrets-intellectual-property/comment-page-1/#comment-29317</link>
		<dc:creator>Christian Gregory</dc:creator>
		<pubDate>Tue, 05 Jul 2011 21:26:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3353#comment-29317</guid>
		<description><![CDATA[There is certainly increased risk of internal breaches as more and more people equate that their proprietary information is a valued commodity to be moved between their employer and its competitors.  

If people want to take that risk, there is enough legal precedent so that they know precisely what kinds of repercussions face them. And the dumbest criminals are the ones who don&#039;t think they can be caught, especially if their employers are keeping current on their security measures.]]></description>
		<content:encoded><![CDATA[<p>There is certainly increased risk of internal breaches as more and more people equate that their proprietary information is a valued commodity to be moved between their employer and its competitors.  </p>
<p>If people want to take that risk, there is enough legal precedent so that they know precisely what kinds of repercussions face them. And the dumbest criminals are the ones who don&#8217;t think they can be caught, especially if their employers are keeping current on their security measures.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-08-12 16:11:40 by W3 Total Cache --