Taking Cover

Chordas, Lori
July 2008
Best's Review;Jul2008, Vol. 109 Issue 3, p96
Trade Publication
The article reports on the move of various corporate directors and officers to respond to the growing threat of cyber attacks in the U.S. It is stated that cyber risks have a wide range, from copyright and patent infringement to data sabotage. It reveals that the directors have responded the threat of cyber crime by upgrading their anti-virus software. Moreover, senior analyst Donald Light reveals the need to have an understanding of the range of cyber threats. INSET: Managing Risks.


Related Articles

  • Preparing for a Black Swan Cyberattack. Herbolzheimer, Claus // Harvard Business Review Digital Articles;9/14/2016, p2 

    The article discusses ways companies should prepare for a "black swan" cyber-attack that can occur with widespread ramifications, including establishing cyber pool funds and creating "SWAT" teams to regularly monitor and address common cyber threats.

  • Hacking - The Corporate Cover-Up. Rachwald, Rob // Software World;Nov2008, Vol. 39 Issue 6, p13 

    The article provides information on cyber security and defense against cyber crime. It cites the case of one of the U.S.' large bellwether stocks which had its applications infrastructure penetrated by a foreign government. Budget figures being spent on information security are also presented....

  • Additional developments.  // Berkeley Technology Law Journal;2000, Vol. 15 Issue 1, p503 

    Presents several cases in the Berkeley Technology Law Journal in California. Includes CDN Inc. v. Kapes on the issue on copyright infringement; Enzo Biochem, Inc. v. Calgene, Inc. on the issue on infringement of patents; Intergraph Corp. v. Intel Corp. on the issue on antitrust law.

  • Anecdotes of Plagiarism: Some Pedagogical Issues and Considerations. Aziz, Jamaluddin; Hashim, Fuzirah; Razak, Norizan Abdul // Asian Social Science;Aug2012, Vol. 8 Issue 10, p29 

    Plagiarism is a contentious issue at best. Despite the common association between teaching, learning and plagiarism, the issue is seldom seen as pedagogical in essence. For that reason, this paper presents some examples of plagiarism in the form of professional anecdotes as experienced by the...

  • Drug safe harbour provisions in the USA and Europe: implications for the emerging biosimilars industry. Kretzschmar, Marcus D. // Journal of Intellectual Property Law & Practice;Apr2014, Vol. 9 Issue 4, p298 

    Both in the United States and in Europe, the patent laws contain a so-called Bolar provision, which provides safe harbor from patent infringement for certain activities related to obtaining marketing authorization for a drug product, whether it is a small molecule or a biologic drug. Recent...

  • Turning the Tables.  // InsideCounsel;Oct2011, Vol. 22 Issue 238, p18 

    The article discusses how big corporations in the U.S. are aiming to generate profits through plaintiff recovery lawsuits. Pharmaceutical and technological companies are using recovery suits to protect their intellectual property and at the same time, earning money from patent infringement....

  • Intellectual Property Law Certification. Lloyd, Jeff // Florida Bar Journal;Jun2012, Vol. 86 Issue 6, p58 

    The article focuses on the Florida Bar Association's Intellectual Property Law Certification, which focuses on patent infringement litigation, trademark law, and copyright law.

  • The Rise of Patents in the Mortgage Industry - A Checklist for Protection in the New World of Mortgage Patents. Glazier, Stephen // Venulex Legal Summaries;2005 Q2, p1 

    The article offers information on the rise of mortgage patents and how this is changing the business practice in the U.S. mortgage industry as of April 2005. The sudden boom of mortgage patents resulted in the enforcement litigation by mortgage patent holders against infringers. Examples of...

  • New cybersecurity tool suite demonstrated this week.  // Biomedical Market Newsletter;8/28/2012, Vol. 21, p1 

    The article a suite of cybersecurity software tools has been developed for the electric utility industry to prevent cyber attacks of their control system.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics