{"id":178,"date":"2007-06-22T00:00:00","date_gmt":"2007-06-22T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/06\/22\/securing-the-company-jewels\/"},"modified":"2021-12-30T11:36:40","modified_gmt":"2021-12-30T11:36:40","slug":"securing-the-company-jewels","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/06\/22\/securing-the-company-jewels\/","title":{"rendered":"Securing the &#8216;Company Jewels&#8217;"},"content":{"rendered":"<p>If your company is like most others, you probably know that intellectual property &#8212; the &#8220;other&#8221; IP &#8212; is the biggest target the crooks have on their want lists right now.  The study, sponsored by security tool vendor Reconnex, shows that many enterprises are struggling in their efforts to secure intellectual property.  &#8220;When we asked people how they were doing in securing IP, most of them said they felt their organizations were doing a good job, if not excellent,&#8221; notes Jon Oltsik, the ESG analyst who authored the study.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The problem, Oltsik says, is that although enterprises are mostly satisfied that they are keeping their IP safe, they are mostly dissatisfied with the amount of time and effort they have to expend to do it.  &#8220;The bad guys want to steal what they can sell, and often, that&#8217;s a company&#8217;s IP.&#8221;<\/p>\n<p>As a result, upcoming spending on intellectual property security will probably be geared toward automating the IP discovery, classification, and protection processes, Oltsik suggests.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=127306&#038;WT.svl=news1_4<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-178","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/178\/revisions"}],"predecessor-version":[{"id":2665,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/178\/revisions\/2665"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}