Improving the Effectiveness of Your Trademark Survey Evidence: Know How to Proceed
Ahmed Zidan2023-09-11T17:08:55-04:00How to Effectively Use Expert Witness Testimony to Prove Damages in IP Litigation
Joenel2023-09-17T21:49:49-04:00Redefining Security Operations with Managed Defense
lazupardo2023-11-16T18:23:10-05:00In this LIVE Webcast, a panel of thought leaders and professionals brought together by The Knowledge Group will provide and present an in-depth analysis of the fundamentals as well as recent developments in Redefining Security Operations with Autonomous SOC. Speakers will also present all important issues surrounding this significant topic. Join us for this Knowledge Group Webinar!
The Growing Data Privacy Concerns Raised by the IoT: Smart Approaches to Manage Risks
Ahmed Zidan2023-09-25T22:10:55-04:00Exploring the AI Patent Landscape: Emerging Top Trends and Shifts to Watch For
Ahmed Zidan2023-07-25T22:36:46-04:00Inventions involving artificial intelligence (AI) continue to face several issues on patentability as it does not qualify as the inventor in US patent applications. The amendment to Section 256 of the America Invents Act removed the deceptive intent requirement while still allowing the correction of inventorship. Although this could resolve incorrect inventorship, patentees may not always agree to adjustments and dispute a claim instead. Thus, posing a myriad of issues on invalidation and unenforceability of patent applications for AI-related inventions.
The Rise of Quantum Computing: Protecting Quantum Innovations with Patents
Ahmed Zidan2023-04-13T09:10:41-04:00Data Security Management: Common Threats and Best Practices to Bolster Defenses
Ahmed Zidan2023-06-12T17:04:07-04:00In this LIVE Webcast, a panel of thought leaders and professionals brought together by The Knowledge Group will provide and present an in-depth analysis of the fundamentals as well as recent developments in Data Security Management: Common Threats and Best Practices to Bolster Defenses.
Trust Me, I’m an Engineer: Escaping the Traps of Social Engineering
Joenel2023-01-31T22:37:18-05:00Social engineering is one of the most primitive, yet effectively dangerous tools in the threat actor’s toolkit.
NFTs and Cryptocurrency: Recent Developments and Legal Issues You Should Be Aware Of
Ahmed Zidan2023-02-09T13:15:18-05:00Non-fungible tokens (NFTs), which are unique digital assets hosted on a blockchain, have become a multi-billion-dollar phenomenon — gaining popularity across multiple domains.
The New IP Monetization Landscape in APAC
lazupardo2022-12-25T20:25:20-05:00In just a few short years, the IP landscape in Asia has shifted dramatically, and nowhere more than in IP monetization.
NIP Ransomware on the Move: What You Must Know and Do to Detect and Prevent Attacks
Joenel2022-12-25T20:26:44-05:00In recent years, ransomware incidents have caused widespread disruptions and devastating consequences to various organizations.
How To Defend Against Known & Unknown Storage & Backup Ransomware Threats
Joenel2022-11-13T20:40:36-05:00Just a few years ago, almost nobody thought that storage & backups were important. That’s no longer the case today.
Navigating the Trade Secret Litigation Landscape: The Way to a Dispute Resolution
Joenel2023-11-15T15:37:28-05:00In today’s highly competitive work environment, trade secrets are the lifeblood of a business. As more and more companies move to hybrid and remote work structures, the risk of misappropriation magnifies. This underscores the need for businesses to level up their trade secret protection and create sophisticated confidentiality controls without stifling collaborative workspaces.
Patentability of ML/AI and Software-Based Inventions: Key Considerations
Ahmed Zidan2022-12-29T01:17:12-05:00Today, the proliferation of machine learning (ML) and artificial intelligence (AI) is significantly changing the business landscape.