Highest Rated Comments


MicheleMooreHappy113 karma

Fascinating talk, thanks so much for your wisdom. You tweeted that you'd answer questions on ANYTHING, well here goes...

If you are developing Intellectual Property you want to keep absolutely confidential and you worry about industrial espionage, how can you best protect yourself?

Parmy Olson / Forbes described super cyber security used by hackers here: http://blogs.forbes.com/parmyolson/2011/03/16/is-this-the-girl-that-hacked-hbgary/ in this way:

She has no physical hard drive and boots her computer from a microSD card. “I could hide this card anywhere or chew into a million pieces in a few seconds,” she says by e-mail. She keeps her operating system on a USB stick and uses a virtual machine (VM) to carry out her online shenanigans.

Are there simple instructions somewhere for learning how to do this?

We are especially interested in identifying the source of the industrial espionage, would simple programs like TCPView or Wireshark allow us to pinpoint where keylogger data is being sent?

Maybe all this doesn't really come under the category of ANYTHING but I thought I'd give it a try.

You are WONDERFUL!!! I really admire your work and enjoy your Twitter feed.

These questions would interest others in the corporate world who are concerned about security intellectual property development.