Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
Your email has been sent
The Five Eyes coalition’s principles focus on reducing the possibility of IP theft, particularly from nation-state-sponsored threat actors.
The Five Eyes security alliance, made up of intelligence agencies from Australia, Canada, New Zealand, the U.K. and the U.S., released on October 17, the Five Principles of Secure Innovation. These principles provide startup founders and other business leaders with guidelines for keeping intellectual property safe from cyberwarfare actors, particularly state-sponsored actors.
Jump to:
The Five Principles of Secure Innovation are:
The Five Principles are focused on protecting IP. For example, under the header of “Know the threats,” National Protective Security Authority specifies “Understand the way state-backed and hostile actors could try and get hold of your technology.”
Investors, suppliers and collaborators can all introduce risk, NPSA and the Five Eyes alliance cautioned.
Other recommendations from Five Eyes about how businesses can protect IP include:
The Five Principles were created as part of Secure Innovation, a joint project between the U.K.’s National Protective Security Authority and the National Cyber Security Centre. The purpose of Secure Innovation is to encourage founders of tech startups and spinoffs to implement security measures as early as possible in the process of creating their new businesses.
SEE: Threat actors increasingly turn to cloud storage apps to spread malware, according to a new Netskope report. (TechRepublic)
“Across all five of our countries we are seeing a sharp rise in aggressive attempts by other states to steal competitive advantage,” wrote NPSA Director General Ken McCallum in a blog post. “This contest is particularly acute on emerging technologies; states which lead the way in areas like artificial intelligence, quantum computing and synthetic biology will have the power to shape all our futures.”
“By understanding the threats to our IP, our CISOs can develop detailed strategies to thwart advisories and dive deeper into the minds of the hackers to prevent targeted IP cyber attacks before they happen,” said Sanjay Poonen, president and chief executive officer of IT company Cohesity, in an email to TechRepublic.
The agencies that make up the Five Eyes are:
According to Tech Monitor, Five Eyes leaders speaking at a joint event in San Francisco on October 17, specifically pointed out possible risks to IP from threat actors operating out of China.
Chinese government spokesman Liu Pengyu told Reuters the accusations were “groundless.”
“Statements from the intelligence communities at the Five Eyes countries are a positive recognition of the persistent threat of Chinese espionage,” said Ted Miracco, chief executive officer of app protection company Approov Mobile Security, in an email statement to TechRepublic.
“The sheer number of motivated (Chinese) hacking teams, the scale of the toolsets and the coordination are unlike anything we’ve ever seen — and add AI to the equation and we have a serious problem,” said David Mitchell, chief technology officer of security solutions company HYAS, in an email to TechRepublic.
“By understanding the threats to our IP, our CISOs can develop detailed strategies to thwart advisories and dive deeper into the minds of the hackers to prevent targeted IP cyber attacks before they happen,” said Poonen.
In May 2023, Microsoft released a warning about Volt Typhoon, a China-sponsored threat actor. Volt Typhoon used “living off the land” data extraction and cyber espionage techniques and targeted critical infrastructure, Microsoft said. Another China-aligned threat actor, Storm-0558, targeted U.S. senior officials in September 2023 using credentials taken from a Microsoft engineer’s corporate account.
Catch up on the week’s essential technology news, must-read posts, and discussions that would be of interest to IT pros working in the UK and Europe.
Five Eyes Coalition Release Guidelines for Business Leaders on Securing Intellectual Property
Your email has been sent
TechRepublic Premium content helps you solve your toughest IT issues and jump-start your career or next project.
This is a comprehensive list of the best AI art generators. Explore the advanced technology that transforms imagination into stunning artworks.
Find the perfect payroll service for your business without breaking the bank. Discover the top cheap payroll services, features, pricing and pros and cons.
Is NordVPN worth it? How much does it cost and is it safe to use? Read our NordVPN review to learn about pricing, features, security, and more.
Free project management software provides flexibility for managing projects without paying a cent. Check out our list of the top free project management tools.
Australian and New Zealand enterprises in the public cloud are facing pressure to optimize cloud strategies due to a growth in usage and expected future demand, including for artificial intelligence use cases.
Catch up on the week’s essential technology news, must-read posts, and discussions that would be of interest to IT pros working in the UK and Europe.
Quality control is an integral part of the software development process that ensures a finished product meets expectations through predictable and peer-checked design methods. This policy from TechRepublic Premium defines quality control measures to make the software development process as efficient and successful as possible. It provides guidelines for the development lifecycle, which can also …
Machine learning is shaping the future of work and society by automating tasks, making data-driven decisions and enhancing efficiency. With a lot of information out there on the subject, TechRepublic Premium presents this quick glossary of 53 key terms and concepts to help your understanding. From the glossary: Autoencoder A type of neural network used …
The significance of artificial intelligence in our modern world cannot be overstated. It has become the bedrock upon which many industries and innovations rest. From healthcare, finance and education to entertainment and autonomous vehicles, the impact of AI in these areas has been nothing but revolutionary. This article from TechRepublic Premium sheds light on the …
By the very nature of their business, IT consultants — who have both access and exposure to a company’s most sensitive data — must be held to the highest ethical standard. This IT Consultant Conduct Policy from TechRepublic Premium outlines a code of conduct for consultants. From the policy: CONSULTANT CODE OF CONDUCT 1. To …
source