Jane Sunderland, of Sunderlaw Strategies, Inc., never imagined that studying biological evolution would someday lead her down a road to data analysis in online protection.
But she joined the MarkMonitor Forum as a speaker on that very topic last week.... Juxtaposing it with the an ever-developing intellectual property industry, she explained:
“It’s about figuring out what the data has to say about trends,” she said. “There have been a lot of changes.”
Among those changes – the fact that online protection challenges now span more business departments and industries than ever. In fact, a MarkMonitor report, slated for release this October,...Read More
GDPR has impacted all areas of business, but for brand protection professionals and those concerned with protecting intellectual property rights, the consequences have been tremendous.
No longer able to view domain registrant contact information for ...IP enforcement efforts, law enforcement and brand protection professionals need to seek alternative methods for finding information necessary to identify copyright and trademark infringers. So when faced with a lack of access to critical information from the WHOIS database and data privacy issues around GDPR, brand owners should revise methods within their traditional three-step approach which includes investigation, identification and enforcement.
A toolkit for brand owners...Read More
Once upon a time, a phishing email would nearly always impersonate a financial organization, would be poorly written and easily recognizable.
Today, there are many ways that phishers can target organizations, employees and consumers – and multiple av...enues that they take to do so. As society becomes increasingly dependent on online processes, phishers become more innovative in capitalizing on those practices.
Case in point? Cryptophishing, a new form of online phishing that has surfaced with the advent of cryptocurrency in online financial practices. We’ll delve into this, but first, let’s review some background on cryptocurrency.
What Is cryptocurrency?
As of this...Read More
The SSL saga continues.
Security certificates are becoming increasingly more important for establishing trust as more users transact online. Threats of online identity theft and fraud have led consumers and business partners to demand assurance that ...personal, financial and business data remains safe. New changes in internet standards and web browsers are giving websites that use HTTPS a leg up and are actively distrusting unsecure sites that remain on HTTP.
Mid-October will herald the release of Firefox 63 and Chrome 70. As a result, users who visit websites with missing or outdated SSL certificates will be greeted with security warnings.
The world of piracy has changed dramatically from just a few years ago.
As technology has advanced to make our working and social lives easier, it’s also allowed pirates to become more sophisticated. They’re even pirating pirated sites and stealing t...he branding of more popular sites using subdomains, redirecting traffic much like they do from legitimate sites.
More than that, the profile of the consumer of digital pirated content has changed too. A few years ago, getting your hands on illegal content took a bit of effort. Yes, it was largely peer-to-peer based, uploading and downloading shows, music and movies, but...Read More