Abstract:
The disclosed computer-implemented method for enforcing data loss prevention policies on endpoint devices may include (i) detecting that an endpoint device has terminated a connection with a protected network that is protected by a network-level data loss prevention system and has connected to an external network that is not protected, (ii) switching, in response to detecting that the endpoint device has connected to the external network, from an in-network data loss prevention policy to an out-of-network data loss prevention policy, (iii) detecting an inbound data transfer to the endpoint device, (iv) determining that the inbound data transfer comprises a transfer from a protected source that is protected by the out-of-network data loss prevention policy, and (v) performing a security action in response to determining that the inbound data transfer to the endpoint device comprises the transfer from the protected source. Various other methods, systems, and computer-readable media are also disclosed.
Abstract:
A method for managing password usage in a system for secure usage of shared accounts includes generating, by a password manager executing on a first computing device, a first credential assigned to a first user, the first credential used for accessing a first user account in an application executing on a second computing device. The method includes transferring, by the password manager, ownership of the first credential from the first user to a second user. The method includes receiving, by the password manager, over a network, a request from the first user to access the first credential. The method includes verifying, by the password manager, ownership of the first credential by the second user. The method includes denying, by the password manager, the request from the first user.
Abstract:
Examples associated with ransomware attack monitoring are described. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated when a number of sequences of file accesses that match the predefined pattern exceeds a first threshold. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system when the number of sequences of file accesses that match the predefined pattern exceeds a second threshold. The reaction module then identifies processes associated with a suspected ransomware attack based on the logging performed by the investigation module, and resumes legitimate processes.
Abstract:
An appliance is capable of storing and processing data related to details surrounding its ownership, behavior, and history within itself in a secure and unalterable way. The appliance may experience multiple transfers in ownership during its lifetime. Certain data stored in the appliance may be encrypted such that only qualifying parties (e.g., owners) may be able to access the data. Some data may remain private to an individual owner while other data may be made available to subsequent owners by passing a shared secret that can be utilized to decrypt the other data. Data may be stored in the appliance in chronological order and may be signed by appropriate parties such that it is not possible to alter the data without detection.
Abstract:
In an example embodiment described herein, keyboard monitoring logic is operable to obtain data typed into a keyboard. The data typed into the keyboard is compared with predefined protected data stored in a local credential file, if data typed into the keyboard matches predefined protected data stored in the credential file, the keyboard monitoring logic determines whether the destination of the typed data ( e.g. , the application, website, or both the application and website are stored in a whitelist. If the destination is not stored in the whitelist, the keyboard monitoring logic determines that an attempt of unauthorized access to protected data is occurring.
Abstract:
Die Erfindung betrifft einen tragbaren Schutzbehälter (10) zum Transport eines Vermessungsgerätes (40), mit einem Innenraum welcher zur Aufnahme des Vermessungsgerätes ausgestaltet ist, wobei der Innenraum mindestens eine Halterung aufweist und wobei die mindestens eine Halterung speziell zur Aufnahme eines bestimmten Geräte-Typs mit bekannten Ausmassen ausgestaltet ist. Der Schutzbehälter weist eine in den Schutzbehälter integrierte Kommunikationseinheit, eine Versorgungseinheit zur Stromversorgung der Kommunikationseinheit, und Überprüfungsmittel zum Überprüfen eines Vorhandenseins und einer Identität eines Vermessungsgerätes im Innenraum auf. Die Erfindung betrifft ausserdem ein System aus mehreren Schutzbehältern, ein Verfahren zum Vorbereiten eines Vermessungsgerätes während eines Transports des Vermessungsgerätes in einem Innenraum eines Behälters, auf einen Einsatz an einem bekannten Einsatzort, und ein Verfahren zum Verhindern einer unberechtigten Entnahme eines Vermessungsgerätes aus einem Behälter..
Abstract:
A method for preventing digital content misuse can include receiving, by a client-side computing device, digital content from a remote computing system; periodically presenting sonic signals to confirm that a mobile computing device of a user authorized with the client-side computing device is within a desired geographic distance of the client-side computing device; receiving, by the client-side computing device, a notification that a number of unconfirmed sonic signals exceeds a threshold number of allowable unconfirmed sonic signals, wherein the number of unconfirmed sonic signals indicates a number of sonic signals presented by the client-side computing device that the mobile computing device did not confirm detecting; and in response to receiving the notification that the number of unconfirmed sonic signals exceeds the threshold number of allowable unconfirmed sonic signals, executing a remedial action.
Abstract:
An electronic resource tracking and storage computer system is provided that communicates with a distributed blockchain computing system that includes multiple computing nodes. The system includes a storage system, a transceiver, and a processing system. The storage system includes an resource repository and transaction repository that stores submitted blockchain transactions. A new resource issuance request is received, and a new resource is added to the resource repository in response. A new blockchain transaction is generated and published to the blockchain. In correspondence with publishing to the blockchain, the transaction storage is updated with information that makes up the blockchain transaction and some information that was not included as part of the blockchain transaction. The transaction storage is updated when the blockchain is determined to have validated the previously submitted blockchain transaction.
Abstract:
A cloud-based application allows a client to obtain audit log information from an application. The application also allows the client to specify which audit log information from the application is reported and secured to a log file of the application.