the Transform Technology Summits begins October 13 with Low-Code / No Code: Enabling Business Agility. Register now!
Strider Technologies has launched a risk intelligence tool that enables companies to better understand potential threats to intellectual property (IP) by analyzing the online interactions of employees and the people who interact with the company.
the Strider Shield The platform combines online tracking tools typically employed by advertising agencies, along with data ingestion tools, natural language processing (NLP), and various classes of algorithms to enable organizations to better assess potential threats to processes and individuals. during development, Strider CEO Eric Levesque told VentureBeat. .
Through Strider Shield, an organization can collect thousands of data points, including email addresses, domain names, keywords in multiple languages, and other terms that can be mapped to the internal systems where the intellectual property resides to identify activities that they can pose a risk to your organization. he said. This approach allows displaying high-fidelity risk signals created by known actors when, for example, they visit websites or interact with people on social media sites, as well as analyzing the tactics, techniques and procedures that are often used to steal property. intellectual, he added. Levesque.
This ability also makes it possible to include an analysis of economic policy to trace the source of those threats back to a nation-state that is likely trying to profit from the theft of intellectual property, Levesque said. “It has become a geopolitical problem,” he added.
How does it work
The techniques Strider uses take advantage of data that is freely available online, so they shouldn’t compromise anyone’s privacy, Levesque said. But the company correlates data to help organizations identify threats that could be targeting specific individuals with access to intellectual property sought by cybercriminals working on behalf of a nation-state, Levesque said.
Organizations in general are now shifting their approach to security to focus on the processes and the people who drive them, Levesque noted. Rather than just targeting systems and applications, cybercriminals are increasingly taking advantage of process weaknesses. As such, Levesque said organizations are beginning to converge managing cyber and physical security to better protect employees and safeguard their IP.
The cost of intellectual property being stolen on a regular basis is measured in billions. Nation states have expanded their cyber espionage activities to include the intellectual property that helps their economies. In response, organizations of all sizes are increasing their efforts to protect intellectual property and prevent a clone of a product or service they are about to launch from suddenly becoming available in a country on the other side of the world.
Nation-states have been stealing corporate intellectual property since the dawn of time. The only real differences today are means and scale. It is not uncommon for organizations to invest millions of dollars creating intellectual property, only to find that the return on that investment is reduced by the sudden appearance of an unexpected competitor. As the level of intellectual property theft continues, government leaders are beginning to appreciate more how intellectual property theft affects both the economy and, ultimately, the amount of taxable income that could be generated. innovations.
There is no silver bullet when it comes to preventing intellectual property theft. But organizations can proactively reduce risks by becoming more aware of threat vectors as they arise. If known actors suddenly spend a lot of time researching a topic online, chances are good that some kind of operation is being planned. In many cases, that knowledge can lead an organization to review its security processes. After all, even in the digital age, being warned is still the first step to being prepared.
VentureBeat’s mission is to be a digital urban plaza for technical decision makers to gain insight into transformative technology and transact. Our site offers essential information on data technologies and strategies to guide you as you run your organizations. We invite you to become a member of our community, to access:
- updated information on the topics of your interest
- our newsletters
- Exclusive content from thought leaders and discounted access to our treasured events, such as Transform 2021: Learn more
- network features and more
Become a member