Get the latest industry news, Prescient expert insights, and investigation techniques here!
The Continuous Diagnostic & Monitoring (CDM) Program is a multi-agency platform and initiative to identify and predict which techniques, models, and emerging technologies cybercriminals and attackers are currently leveraging and will be exploiting in the future. The CDM Central conference will discuss several public and private sector efforts to establish security beyond perimeters, safeguard mobile devices, and protect sensitive data in the cloud. The objective is to pinpoint tactical and strategic risk coordinates for successful risk management in “Navigating the Cyber Roadmap”.
In the early 1700s, a French Jesuit missionary in China sent detailed porcelain manufacturing information back to France. In the 1800s, the British East India Co. hired Robert Fortune, a Scottish botanist, to travel to China and smuggle tea to help India gain a competitive edge in the tea market. And in 2018 and 2019, two Apple Inc. engineers were accused of stealing valuable trade secrets (photos and electronic files) related to Apple’s autonomous car program, Project Titan. Clearly, just as business has changed along with the technology we use daily, so too have the methods of spying. But the essence of corporate espionage–known also as industrial or economic espionage–remains unchanged.
When it comes to technological breakthroughs, the focus remains on paradigm shifts: everyone wants to take part in the next big thing, the next breakthrough that will revolutionize the way that the world works. As the self-styled Steve Jobs of the healthcare industry, Elizabeth Holmes promised investors this degree of innovation with her startup, Theranos. Years later, with Holmes’ criminal trial date announced for the summer of 2020, her Silicon Valley debacle creeps back into the national spotlight, positing her as a fraud rather than an innovator.