<img alt="" src="https://secure.leadforensics.com/61439.png" style="display:none;">

White papers

White papers
Converting Unlicensed Use to Revenue

Converting Unlicensed Use to Revenue

How software vendors are evolving strategies to discover new customers, increase profit, and reduce risk of data loss.

White papers
What Do GDPR & CCPA Data Privacy Regulations Mean for Software License Management?

What Do GDPR & CCPA Data Privacy Regulations Mean for Software License Management?

GDPR and CCPA are part of a new global regulatory trend towards more complete definitions of what personal information (PI) entails.

White papers
Five Dos and Don'ts for Protecting Your Software

Five Dos and Don'ts for Protecting Your Software

Are you doing everything you can to protect your valuable IP? Here are five best practices for protecting your software from piracy.

White papers
What Your Government Isn't Doing for You

What Your Government Isn't Doing for You

Many people think the U.S. government is fervently using law enforcement and national security resources to protect citizens and companies from cyber threats and IP theft. This is not true.

White papers
How the ITC Can Help You Stem IP Theft

How the ITC Can Help You Stem IP Theft

If you can demonstrate that your trade secrets have been stolen, the ITC can seal the border so that no products made using your trade secrets can enter the U.S.

White papers
Using Cultural Intelligence to Enhance Your Compliance Program

Using Cultural Intelligence to Enhance Your Compliance Program

There are fundamental differences in values, behaviors, and attitudes that are expressed in cultures worldwide, and these have a significant impact on decision-making processes.

E-Books

E-Books
Gartner: Using Data Analytics

Gartner: Using Data Analytics

Digital business success hinges on modern and effective data and analytics. Organizations that fail to properly utilize data assets will be left behind. This e-book is designed to help data and analytics leaders.

E-Books
Ultimate Guide to Piracy

Ultimate Guide to Piracy

In this e-book the world’s leading license compliance managers, intellectual property experts, and commercial litigation attorneys share their best practices for protecting your software company from piracy and under compliance.

Videos

Videos
2020 Cylynt Summit Presentations

2020 Cylynt Summit Presentations

This year’s summit featured exceptional presentations from some of the most influential drivers in the anti-piracy industry. If you missed this event, or want to review any of the presentations, videos are now available on-demand.

Videos
2020 Cylynt User Group

2020 Cylynt User Group

The Cylynt User Group meets annually at the summit conference to learn about new Cylynt technologies, as well as to share best practices for getting the most out of their software investment. If you missed this year's meeting, or want to review what was discussed, videos of the user group sessions are now available on demand (customers only).

Videos
Cylynt Thales Webinar:  Convert Software License Misuse to Software Sales

Cylynt Thales Webinar: Convert Software License Misuse to Software Sales

This webinar presents the synergistic license compliance and management solutions offered by Thales and Cylynt that uncover and protect against misuse of software licenses while also delivering data-driven business intelligence and revenue-generation opportunities.

Videos
Automotive Cybersecurity Online: Protecting the Supply Chain and Defending the Cogs of the Manufacturing Machine

Automotive Cybersecurity Online: Protecting the Supply Chain and Defending the Cogs of the Manufacturing Machine

This video recording of the Automotive Cybersecurity Online virtual event features Ted Miracco discussing digital security in the supply chain, closing the gap between product and enterprise security, and mitigating the information security and privacy risk nexus of the IoT.

Videos
Data-Driven Marketing Drives the Customer Experience

Data-Driven Marketing Drives the Customer Experience

Ted Miracco discusses how data-driven marketing can turn a shotgun approach into a rifle shot.

Videos
2019 Anti-Piracy Summit, Michael Gallagher, President & CEO, Hexagon Manufacturing Intelligence Canada, Ltd.

2019 Anti-Piracy Summit, Michael Gallagher, President & CEO, Hexagon Manufacturing Intelligence Canada, Ltd.

In an exclusive interview, Michael Gallagher, President & CEO of Hexagon Manufacturing Intelligence Canada Ltd. talks to Ted Miracco, CEO, Cylynt on how Hexagon uses technology and process to protect customers and drive one of the world's most successful license compliance programs.

Videos
Part I: David Laufman, Partner, Wiggin and Dana LLP, Discusses the Challenges of Fighting Chinese IP Theft

Part I: David Laufman, Partner, Wiggin and Dana LLP, Discusses the Challenges of Fighting Chinese IP Theft

Part I: Ted Miracco, CEO, Cylynt, and David H. Laufman, partner at Wiggin and Dana LLP and former head of counterintelligence for the Dept. of Justice, discuss the implications of the U.S./China trade deal and the challenges the government and private sector companies are facing in fighting Chinese IP theft.

Videos
Part II: David Laufman, Partner, Wiggin and Dana LLP, Discusses Government & Private Companies Partnering to Fight Software Piracy

Part II: David Laufman, Partner, Wiggin and Dana LLP, Discusses Government & Private Companies Partnering to Fight Software Piracy

Part II: Ted Miracco, CEO, Cylynt, and David H. Laufman, Partner at Wiggin and Dana LLP and former head of counterintelligence for the Dept. of Justice, discuss how the government is partnering with private companies to protect valuable intellectual property from piracy by China.

Videos
2019 Anti-Piracy Summit, David Laufman, Keynote Speaker

2019 Anti-Piracy Summit, David Laufman, Keynote Speaker

In an exclusive interview with CNN, David Laufman, former chief of counterintelligence in the National Security Division at the DOJ and a partner at Wiggin and Dana, LLP, discusses his involvement early on in the Mueller Investigation and Russia probe.

Videos
TransMagic Recovers $1.2M in Lost Revenue With Cylynt

TransMagic Recovers $1.2M in Lost Revenue With Cylynt

Transmagic's CEO discovered a cracked version of the company's software selling on dozens of sites for $99. This issue had a major impact on TransMagic sales. Watch how this CEO fought back and won.

Videos
Declassified:  The Inside Story of Catching a Cyber-Pirate

Declassified: The Inside Story of Catching a Cyber-Pirate

This video features David Locke Hall, partner at Wiggin and Dana, LLP and author of "Crack 99, The Takedown of a $100 Million Chinese Software Pirate."

Reports

Reports
Ciela Insights: Software Copyright Litigation in China

Ciela Insights: Software Copyright Litigation in China

The Rouse Magazine CIELA Insights discusses why many major software vendors do not appear to be using China's courts to seek remedies for piracy.

Reports
BSA Survey 2018

BSA Survey 2018

This in-depth analysis of the use of unlicensed software shows that companies that implement strong measures to improve the way they manage software now.

Reports
2017 Update IP Commission Report

2017 Update IP Commission Report

In a newly-released 2017 update to the original report, the commission provides a new assessment of the problem and examines the progress that has been made on the original....

Reports
2013 IP Commission Report

2013 IP Commission Report

In 2013, the Commission on the Theft of American Intellectual Property released a report detailing the enormity of the issue of intellectual property (IP) theft in the United States....

Reports
BSA Survey 2015

BSA Survey 2015

BSA’s Global Software Survey conducted in partnership with IDC, estimates the volume and value of unlicensed software installed on personal computers in 2015, across more....

Reports
APT1 Cyber Espionage Threat

APT1 Cyber Espionage Threat

This report is focused on the most prolific cyber espionage group Mandiant tracks: APT1. This single organization has conducted a cyber espionage campaign against a broad range of victims since at least 2006.

Articles

Articles
Safeguarding Software IP During And Beyond The Pandemic

Safeguarding Software IP During And Beyond The Pandemic

This article discusses how hearty compliance programs coupled with anti-piracy technology can protect software from piracy through a data-driven approach that uncovers illegal usage and permits compliance professionals and their counsel to shut down pirates, recover lost revenue and enhance the protection of their software.

Articles
Why Safety-Critical Verification Is So Difficult

Why Safety-Critical Verification Is So Difficult

Ted Miracco joins Experts at the Table: Proprietary hardware makes software development more difficult; how to deal with over-the-air updates.

Articles
Where We Are In The US Trade Secret Crackdown On China

Where We Are In The US Trade Secret Crackdown On China

David Laufman, Joseph Casino and Michael Kasdan of Wiggin and Dana, LLC, report on the theft of U.S. companies' trade secrets and other intellectual property by Chinese entities has increased dramatically.

Articles
Statement Before the Committee on the Judiciary U.S. Senate

Statement Before the Committee on the Judiciary U.S. Senate

Bill Priestap, former assistant director of the FBI Counterintelligence Division, reports on China's non-traditional espionage against the U.S.

Articles
The Spy Business is Booming and We Should Be Worried

The Spy Business is Booming and We Should Be Worried

Bill Priestap, former assistant director of the FBI Counterintelligence Division, talks about the growing threat of Chinese espionage.

Articles
CCPA: My Business Isn’t Based In California – Should I Be Taking Action?

CCPA: My Business Isn’t Based In California – Should I Be Taking Action?

Paul Hastings, LLP authors give their perspective on the CCPA which will take effect on 1st January 2020.

Articles
Privacy Shield Issues

Privacy Shield Issues

Some of the key points to bear in mind if your organisation is considering participation in the Privacy Shield are as follows.

Articles
ITC Wins at Supreme Court

ITC Wins at Supreme Court

Law360, New York (January 9, 2017, 3:13 PM EST) -- The U.S. Supreme Court on Monday said it will not tackle a case that saw the U.S. International Trade Commission sanction....

Articles
A New Idea for Fighting Chinese Theft

A New Idea for Fighting Chinese Theft

China is engaged in an organized effort to mass-produce counterfeit goods for resale abroad. This counterfeiting and copyright and trademark infringement harms America.

Articles
Emerging Tech Companies: Data Regulation

Emerging Tech Companies: Data Regulation

Emerging Tech Companies: It’s Not Your Uncle’s Dot.Com Regulatory Environment Anymore for Privacy and Data Security.

Archived Articles
Archived Articles

Archived Articles

Interested in our Archived Articles? Continue reading here!

Newsletters

Newsletters
October 2020

October 2020

Newsletters
September 2020

September 2020

Newsletters
July 2020

July 2020

Newsletters
June 2020

June 2020

Newsletters
April 2020

April 2020

Newsletters
February 2020

February 2020

Newsletters
December 2019

December 2019

Newsletters
July 2019

July 2019

Newsletters
April 2019

April 2019

Newsletters
February 2019

February 2019

Newsletters
December 2018

December 2018

Newsletters
November 2018

November 2018

Newsletters
August 2018

August 2018

Newsletters
June 2018

June 2018

Newsletters
April 2018

April 2018

Archived Newsletters
Archived Newsletters

Archived Newsletters

Interested in our Archived Newsletters? Continue reading here!