#production-secrecy

[ follow ]
#insider-threat
fromTNW | Data-Security
4 days ago

Hasbro hacked: Peppa Pig & Transformers owner warns of weeks of disruption

Hasbro disclosed unauthorized access to its systems, an intrusion first detected on 28 March that has since forced the company to take parts of its infrastructure offline and warn that product deliveries could be delayed for weeks.
London startup
#ai
fromFuturism
2 days ago
Intellectual property law

Anthropic Suddenly Cares Intensely About Intellectual Property After Realizing With Horror That It Accidentally Leaked Claude's Source Code

Intellectual property law
fromFuturism
2 days ago

Anthropic Suddenly Cares Intensely About Intellectual Property After Realizing With Horror That It Accidentally Leaked Claude's Source Code

Anthropic's copyright takedown request for its AI model's source code highlights hypocrisy in its stance on copyright laws.
#ai-security
fromInfoWorld
2 days ago
Information security

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Information security
fromInfoWorld
2 days ago

Claude Code leak puts enterprise trust at risk as security, governance concerns mount

Leaks threaten Anthropic's market position and raise security concerns about its AI coding tools.
Remote teams
fromCity AM
1 week ago

The Debate: Is employee tracking justified in the modern workplace?

Tracking junior employees' work hours ensures accountability and productivity, addressing issues of underreporting and resource allocation.
#super-micro-computer
Silicon Valley
fromSecurityWeek
2 weeks ago

3 Men Charged With Conspiring to Smuggle US Artificial Intelligence to China

Three individuals, including a senior VP of Super Micro, were charged with smuggling advanced Nvidia chips to China, violating U.S. export laws.
Silicon Valley
fromSecurityWeek
2 weeks ago

3 Men Charged With Conspiring to Smuggle US Artificial Intelligence to China

Three individuals, including a senior VP of Super Micro, were charged with smuggling advanced Nvidia chips to China, violating U.S. export laws.
Privacy professionals
fromMedCity News
2 weeks ago

The Evolving Landscape of Privacy and Cybersecurity: Essential Strategies for Legal and Compliance Professionals - MedCity News

Organizations must combine strong controls with comprehensive employee training and accountability culture to effectively protect sensitive data and comply with evolving privacy laws.
#patent-law
Intellectual property law
fromPatently-O
1 week ago

Prototype Enough: Even More Expansion to the ITC Domestic Industry Framework

The Federal Circuit upheld the ITC's exclusion order against certain Apple Watch models in a patent dispute with Masimo over blood oxygen technology.
Intellectual property law
fromPatently-O
1 week ago

Prototype Enough: Even More Expansion to the ITC Domestic Industry Framework

The Federal Circuit upheld the ITC's exclusion order against certain Apple Watch models in a patent dispute with Masimo over blood oxygen technology.
#data-breach
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
Information security
fromTheregister
3 days ago

The company's biggest security hole lived in the breakroom

An internet-connected coffee machine caused a major data breach by exploiting security vulnerabilities in a corporate network.
fromFast Company
3 weeks ago

The real reason your ideas get stolen at work-and how to stop it

Before the idea was announced, one of my coworkers, a PR guy, shared the idea-my idea-with the CEO and CMO. While he didn't exactly say he'd done the work himself, how he talked about it made it seem like it was all his.
Humor
#trade-secrets
Intellectual property law
fromPatently-O
6 days ago

Disclosed but Still Secret? The Federal Circuit Weighs Patent Publications Against Trade Secret Claims

The case examines the balance between patent disclosures and trade secret protection under California law regarding a cosmetic penile implant.
Intellectual property law
fromPatently-O
6 days ago

Disclosed but Still Secret? The Federal Circuit Weighs Patent Publications Against Trade Secret Claims

The case examines the balance between patent disclosures and trade secret protection under California law regarding a cosmetic penile implant.
#trade-secret-theft
fromSFGATE
1 month ago
Silicon Valley

3 Bay Area engineers face prison after allegedly leaking Google trade secrets

Toronto startup
fromTESLARATI
3 weeks ago

Tesla VP explains latest updates in trade secret theft case

Tesla won a permanent injunction against Matthews International for stealing trade secrets related to battery manufacturing technology and selling it to competitors.
fromSFGATE
1 month ago
Silicon Valley

3 Bay Area engineers face prison after allegedly leaking Google trade secrets

Privacy technologies
fromTech Times
3 weeks ago

Top Strategies to Protect Your Online Privacy from AI Tracking and Data Collection

Implement VPNs, two-factor authentication, app permission audits, and tracker blockers to protect personal data from AI-driven monitoring and unauthorized collection.
#copyright
Venture
fromComputerworld
4 weeks ago

China announces new plans to take US industry head on

China aims to increase digital economy share to 12.5% of GDP by 2030 and boost funding for start-ups in advanced technologies to compete with the US.
#ransomware
Information security
fromTheregister
1 week ago

Chip tester shrugged off ransomware - then came the leak

Trio-Tech International reversed its initial assessment of a ransomware attack, now considering it a material cybersecurity event after data was disclosed.
Information security
fromTheregister
1 week ago

Chip tester shrugged off ransomware - then came the leak

Trio-Tech International reversed its initial assessment of a ransomware attack, now considering it a material cybersecurity event after data was disclosed.
#semiconductor-export-controls
European startups
fromTechCrunch
1 month ago

US reportedly considering sweeping new chip export controls | TechCrunch

The Trump administration drafted rules requiring U.S. government approval for all AI chip exports, giving the Department of Commerce control over semiconductor sales by companies like AMD and Nvidia.
European startups
fromTechCrunch
1 month ago

US reportedly considering sweeping new chip export controls | TechCrunch

The Trump administration drafted rules requiring U.S. government approval for all AI chip exports, giving the Department of Commerce control over semiconductor sales by companies like AMD and Nvidia.
fromSecuritymagazine
2 weeks ago

Targeted Phishing Attack Breaches Biotech Company Data

This phishing attack enabled the threat actor to access 'certain internal IT business applications.' The malicious actor gained unauthorized entry by compromising an employee's access to the organization's internal network for business administration.
Information security
Artificial intelligence
fromComputerWeekly.com
1 month ago

US artificial intelligence developers accuse Chinese firms of stealing their data | Computer Weekly

US AI developers report Chinese competitors using distillation attacks to extract model data, while facing accusations of training models on unlicensed data themselves.
Intellectual property law
fromPatently-O
3 weeks ago

Made in America: Director Squires Ties IPR Institution to Domestic Manufacturing

The USPTO Director introduced three discretionary factors for IPR and PGR decisions prioritizing U.S. manufacturing and small business status, mirroring the ITC's domestic industry requirement for patent relief.
Information security
fromSecurityWeek
1 month ago

How Pirated Software Turns Helpful Employees Into Malware Delivery Agents

Free pirated software often contains malware that can compromise corporate security, steal credentials, and enable ransomware attacks on company endpoints.
Information security
fromForbes
1 month ago

Adapting Brand Protection Strategies In The Age Of AI And Deepfakes

AI and automation have industrialized brand abuse at scale, requiring brands to move beyond manual enforcement to technology-driven defense strategies that match attacker velocity and economics.
#economic-espionage
fromAxios
2 months ago
Artificial intelligence

Ex-Google engineer found guilty of stealing AI secrets for China

fromAxios
2 months ago
Artificial intelligence

Ex-Google engineer found guilty of stealing AI secrets for China

Business
fromeLearning Industry
2 months ago

Institutional Knowledge: Definition, Risks, And How To Preserve It

Institutional knowledge is the accumulated experience, processes, unwritten practices, and cultural norms that enable an organization to operate and make informed decisions.
Intellectual property law
frompatentlyo.com
3 weeks ago

Guest Post: Protectionist PTO Memo is on a Collision Course with TRIPS

USPTO Director's new policy considers U.S. manufacturing status when deciding whether to institute IPR and PGR proceedings, potentially conflicting with WTO TRIPS obligations requiring nondiscriminatory patent treatment.
US politics
fromwww.mercurynews.com
1 month ago

Opinion: Trump risks US innovation and security if he sells China advanced chips

China aims to displace U.S. global leadership through economic and technological means, prompting calls to restrict advanced chip exports and tighten national security reviews.
fromComputerworld
2 months ago

India may require smartphone manufacturers to disclose source code

According to information provided to Reuters, India is considering a new security requirement that could require smartphone manufacturers to share their source code with the state. The proposal is part of a package of 83 security standards designed to strengthen protection against data breaches and fraud. The requirements include that manufacturers must allow Indian authorities to review the source code in special test labs and notify the government before major software updates are released.
World news
Intellectual property law
frompatentlyo.com
3 weeks ago

Untethered: USPTO Loosens the Article of Manufacture Requirement for Digital Designs

The USPTO relaxed design patent rules for computer-generated interfaces and icons, removing display panel requirements, allowing 'for' prepositions in claims, and extending eligibility to projected, holographic, virtual, and augmented reality designs.
#technology-transfer
Business
fromTNW | Opinion
2 months ago

When corporate knowledge becomes invaluable

Poorly structured, rigidly transferred corporate knowledge can transform from asset to disadvantage, compounding over time and stifling employee innovation.
fromSecuritymagazine
1 month ago

Shadow AI: The Invisible Insider Threat

Shadow AI is the unsanctioned use of artificial intelligence tools outside of an organization's governance framework. In the healthcare field, clinicians and staff are increasingly using unvetted AI tools to improve efficiency, from transcription to summarization. Most of this activity is well-intentioned. But when AI adoption outpaces governance, sensitive data can quietly leave organizational control. Blocking AI outright isn't realistic. The more effective approach is to make safe, governed AI easier to use than unsafe alternatives.
Privacy professionals
Tech industry
fromIndependent
2 months ago

US Justice Department opens probe in alleged corporate spy plot involving Irish executive

The U.S. Justice Department opened a criminal investigation into allegations that Deel recruited an Irish spy inside rival Rippling.
fromThe Cipher Brief
2 months ago

How China Built AI Dominance on Stolen American Silicon

The operation reveals a broader strategy: if you can't build it, take it. With a blend of state-run espionage and corporate infiltration, China has turned technology acquisition into an art form. Their 'all-of-the-above' approach has allowed their AI sector to grow even as export bans tighten. By sourcing the hardware from elsewhere, Beijing has made the lack of domestic chip manufacture moot.
World news
Business intelligence
fromSecuritymagazine
2 months ago

Private Sector Intelligence Careers

Private-sector intelligence roles require public-sector analytic skills plus explicit training in cognitive tradecraft, decision support, and structured reasoning for business contexts.
Information security
fromTheregister
1 month ago

Threat intelligence supply chain is full of weak links

China's ban on foreign security software threatens the global threat intelligence ecosystem by risking data fragmentation and weakening international cybersecurity collaboration.
fromComputerworld
2 months ago

India could grab for iPhone source code - or worse

Almost 20 years ago, Apple CEO Steve Jobs announced the iPhone as "an iPod, a phone, an internet communicator." The world swooned at the time because that one device was all those things, and more. Today it is our wallet, our identity, our social media, our likes, dislikes, fitness levels, bank accounts, as well as our personal, sexual, and political identity.
Privacy professionals
#patent-strategy
Intellectual property law
fromPatently-O
1 month ago

Guest Post: Design Patents at the ITC

The ITC applied a lower visual similarity standard than the Federal Circuit requires in finding design patent infringement, potentially allowing judges to disregard claimed design elements as minor or trivial.
fromThe Cipher Brief
2 months ago

Export Controls Backfire: The China Innovation Paradox

Instead of paralyzing China's AI sector, these controls have promoted domestic self-reliance. With no choice but to develop indigenous workarounds and architectural innovations, Chinese businesses are decoupling AI progress from sheer hardware volume. U.S. policies have undoubtedly bought time, but they have also ushered in a parallel innovation ecosystem totally independent of Western influence.
Artificial intelligence
#intellectual-property-protection
Intellectual property law
fromEntrepreneur
1 month ago

Protecting Your Brand in the Age of AI: What Founders Need to Know Now

AI accelerates content creation but does not eliminate legal responsibility; founders must understand copyright, trademark, and IP protections in the AI era to avoid costly mistakes.
fromEntrepreneur
1 month ago

AI Can Delete Your Data. Here's Your Prevention Plan.

Never feel that you are totally safe. In July 2025, one company learned the hard way after an AI coding assistant it dearly trusted from Replit ended up breaching a "code freeze" and implemented a command that ended up deleting its entire product database. This was a huge blow to the staff. It effectively meant that months of extremely hard work, comprising 1,200 executive records and 1,196 company records, ended up going away.
Artificial intelligence
fromAbove the Law
2 months ago

What If Tariffs Go Away - Or Don't? How You Can Protect Your Bottom Line With Contract Intelligence - Above the Law

With the Supreme Court potentially poised to invalidate recent tariffs, organizations face a confusing scenario. Having clear visibility into contract terms - such as price adjustments and renegotiation provisions - is essential to navigating this volatility. Come join us on at 1 p.m. ET on Jan. 27 for this CLE-approved webinar, where we'll discuss the current state of the tariff conundrum and explore strategies for achieving contract visibility with the latest AI innovations.
Artificial intelligence
Information security
fromSecurityWeek
2 months ago

Nike Probing Potential Security Incident as Hackers Threaten to Leak Data

Nike is investigating a potential cybersecurity incident after WorldLeaks listed Nike as a victim and threatened to publish alleged stolen data unless paid.
Information security
fromEntrepreneur
2 months ago

How to Keep Your Company's Data Out of the Wrong Hands

Data security requires keeping sensitive data local, restricting access strictly, and holding vendors to higher standards to prevent breaches, leaks, and legal exposure.
fromSecuritymagazine
2 months ago

Target's Source Code Confirmed Stolen: Why Does This Matter?

On Jan. 12., BleepingComputer reported that multiple repositories appeared on Gitea, apparently containing parts of internal code and developer documentation belonging to the major retailer Target . As of today, Jan. 13, multiple employees of the retailer have confirmed the leaked materials are authentic. As of current reports, the threat actor behind this incident is unknown. Likewise, it is unclear whether this exposure is due to a leakage, a breach or an insider's action.
Information security
Information security
fromComputerWeekly.com
1 month ago

The world's default productivity tool is becoming a national security liability | Computer Weekly

Dependence on a default productivity platform concentrates systemic risk as state-backed groups like APT28 rapidly weaponize Office vulnerabilities, turning spreadsheets into tools of cyber warfare.
#patents
fromAbove the Law
2 months ago

From Cost Center To Value Engine: Patent Management In The AI Era - Above the Law

In a recent Tradespace and Above the Law survey, two-thirds of companies that draft patents in-house described IP as a value driver, while 71 percent of companies that outsource drafting viewed IP as a cost. When drafting and prosecution move inside, IP teams work closer to engineers and product leaders. This proximity improves invention quality, strengthens claim strategy, and aligns patent decisions with product direction, market timing, and business priorities.
Intellectual property law
#intellectual-property
Intellectual property law
fromPatently-O
2 months ago

Large Entities Achieve Double the Patent Allowance Rate of Micro Entities

Large entities secure patents at far higher rates than small and micro entities, with allowance rates of 80%, 61%, and 40% respectively.
[ Load more ]