JSLOGO.png
  • All Posts
  • Getting Started
  • Your Community
  • Security
  • Government
  • Defense
Search
Insider Threat: Detecting Corporate Espionage - Patent Considerations
Jigsaw Security
  • May 3, 2018
  • 3 min

Insider Threat: Detecting Corporate Espionage - Patent Considerations

Over the last several weeks we have been engaged more and more for insider threat engagements. These engagements are a priority in the tech industry because of the risk of loss of proprietary processes and other legal considerations in patent law, ITAR restrictions and other areas of concern. With more technology the risk of being targeted increase exponentially as new developments are realized in the tech industry. It is estimated that 20 billion in US dollars are lost annua
35 views0 comments
Why Cyber is not enough...
Security Operations Team
  • Apr 19, 2018
  • 3 min

Why Cyber is not enough...

In today's world just securing your Cyber infrastructure is not enough. In many cases companies and agencies spend huge amounts of their budgets on protecting network connected resources but there are other areas that need to be evaluated. In early 2018 Jigsaw Security adopted the CDM model (diagram) for protecting networks. This is great except that it lacks in some areas that we feel are very important in protecting your corporate and proprietary information. Annually over
6 views0 comments
If it's free you can't complain
Technology
  • Nov 17, 2017
  • 2 min

If it's free you can't complain

Happy Friday everybody! We are working this Friday even though as the year winds to a close and everybody is taking their vacation days so they don't lose them. While working with some analyst this morning we heard one of them say "If it's free, you can't complain". So we decided that we would go ahead and write about it today. Normally we keep our post more technical or to a point but today we thought we would change things up and cover some topics not often covered. So what
6 views0 comments