Search for: "Sophos Inc." Results 1 - 17 of 17
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
28 Mar 2018, 4:03 pm by Lawrence B. Ebert
IANCU:In this inter partes review, Finjan Holdings, Inc. challengedvarious claims of Sophos Limited’s U.S. [read post]
17 Mar 2022, 10:54 am by Jonathan Stroud
” Intel and Xilinx combined to cancel a number of litigation-funded chip patents from Arbor Global Strategies and FG SRC LLC [the latter funded by Freeman Capital Partners]; a number of Fortress-funded subsidiaries were challenged; another 29 IP Edge subsidiary suits; some interesting pharmaceutical action; and companies WebRoot and OpenText, inc. have launched a new assertion campaign against Trend Micro, Kapersky Labs, CrowdStrike, and Sophos on cybersecurity products. [read post]
17 Mar 2019, 3:11 am
Moreover it discusses the German Federal Supreme Court's decision regarding the requirements for establishing a legal interest in a declaratory judgment of non-infringement under German law and the decision of the Finnish Supreme Court on whether or not the preconditions for precautionary measures were at hand in a patent law infringement case.Patentlyo writes about the Sophos, Inc. v. [read post]
19 Nov 2007, 11:49 pm
These statistics are the result of a study recently released by Sophos, Inc. [read post]
8 Mar 2012, 6:33 pm by SO Issues
The darknet is “a secret Internet,’’ said Chester Wisniewski, senior adviser at Burlington computer security company Sophos Inc. [read post]
23 Nov 2015, 8:00 am by Peter L. Altieri
Michael Valentine, a corporate vice president of Fortinet, Inc., a California based network security company, left for a competitor, Sophos, in the end of 2013. [read post]
23 Nov 2015, 8:00 am by Peter L. Altieri
Michael Valentine, a corporate vice president of Fortinet, Inc., a California based network security company, left for a competitor, Sophos, in the end of 2013. [read post]
23 May 2012, 3:00 am by Andrea Cannavina
Practical IT: How to Assess a Third-Party Provider’s Security, by cybersecurity specialist Ross McKerchar on Sophos’ Naked Security blog. [read post]