Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Securing the 'Company Jewels'

Enterprises struggle with how to define their intellectual property - and how to keep it safe from the bad guys

Of all the data stored by your company, which would be considered "intellectual property" -- and what special steps do you take to secure it?

If your company is like most others, you probably know that intellectual property -- the "other" IP -- is the biggest target the crooks have on their want lists right now. But your methods for discovering and protecting IP are frustratingly manual and time-consuming.

These are some of the conclusions of a new study scheduled to be released by Enterprise Strategy Group next week. The study, sponsored by security tool vendor Reconnex, shows that many enterprises are struggling in their efforts to secure intellectual property.

"When we asked people how they were doing in securing IP, most of them said they felt their organizations were doing a good job, if not excellent," notes Jon Oltsik, the ESG analyst who authored the study. "Yet when we asked them about their spending plans for the coming year, 54 percent said they are going to spend more to secure IP. We see a real disconnect there."

The problem, Oltsik says, is that although enterprises are mostly satisfied that they are keeping their IP safe, they are mostly dissatisfied with the amount of time and effort they have to expend to do it.

Some 55 percent of respondents say they rely on manual scans of file servers in order to identify IP, defining it by content type, keywords, author, or other criteria, according to the ESG study. Sixty-eight percent of organizations said they spend more than 40 person-hours or more each quarter to discover and classify their IP. Fifty-six percent of enterprises with 20,000 or more employees said they spend more than 80 person-hours per quarter on IP discovery.

"This simply can't scale to meet growing security and compliance needs," the study says. Yet, at the same time, the threat to intellectual property is growing all the time. "Attacks are becoming more targeted, more financially motivated," Oltsik says. "The bad guys want to steal what they can sell, and often, that's a company's IP."

As a result, upcoming spending on intellectual property security will probably be geared toward automating the IP discovery, classification, and protection processes, Oltsik suggests. "There are some good emerging tools out there -- tools for doing classification, tools for doing port blocking, tools for doing [data leak prevention]. I think those are areas where we'll see more investment."

— Tim Wilson, Site Editor, Dark Reading

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-16632
PUBLISHED: 2021-05-15
A XSS Vulnerability in /uploads/dede/action_search.php in DedeCMS V5.7 SP2 allows an authenticated user to execute remote arbitrary code via the keyword parameter.
CVE-2021-32073
PUBLISHED: 2021-05-15
DedeCMS V5.7 SP2 contains a CSRF vulnerability that allows a remote attacker to send a malicious request to to the web manager allowing remote code execution.
CVE-2021-33033
PUBLISHED: 2021-05-14
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
CVE-2021-33034
PUBLISHED: 2021-05-14
In the Linux kernel before 5.12.4, net/bluetooth/hci_event.c has a use-after-free when destroying an hci_chan, aka CID-5c4c8c954409. This leads to writing an arbitrary value.
CVE-2019-25044
PUBLISHED: 2021-05-14
The block subsystem in the Linux kernel before 5.2 has a use-after-free that can lead to arbitrary code execution in the kernel context and privilege escalation, aka CID-c3e2219216c9. This is related to blk_mq_free_rqs and blk_cleanup_queue.