Articles
Security, Identity and Privacy
Bruce Devlin - new Put your hand up if you have more than one online-identity. Keep your hand up if the adverts for your latest online purchase follow you between identities as you surf the web. You can now let your hand fall into your lap because adverts that follow you indicate algorithms that have merged your multiple identities into the one and only you.
Tags: iss131 | class | Security | Identity | Privacy | gdpr | Bruce Devlin - new
Contributing Author Bruce Devlin - new Click to read or download PDF
There is no where to hide from cybercrime
Mark Harrison The media sector is an attractive target for cyber attacks of all kinds from malicious individuals who enjoy disrupting high profile shows, to organised criminals who are attracted by the value of content, to nation states aware that media is a way of conveying or distorting messages.
Tags: iss128 | dpp | cybercrime | microsoft | azure | tinopolis | security | Mark Harrison
Contributing Author Mark Harrison Click to read
State of the Nation - part 1
Dick Hobbs - new Imagine you are the director of the Champions League Final, knowing that 200 million people will be watching your every decision. Or you're directing the Eurovision Song Contest. Or even, to be honest, the Tunbridge Wells local news opt out. And at live minus 30 seconds, all the screens in the monitor wall suddenly go black then show a demand, in broken English, for 300 Bitcoin.
Tags: iss126 | iabm | british airways | ransom | bitcoin | cybersecurity | cots | Dick Hobbs - new
Contributing Author Dick Hobbs - new Click to read
Content Security in the CLoud
Bruce Devlin Security is a difficult topic. There is no such thing a generic security. You always secure yourself against specific threats and hope the solution is generic enough to cover other similar classes of threat. For example - placing an expensive lock on the front door of your house prevents the specific threat of gaining access by using the door handle on the door. It gives you no protection at all from someone using a diamond tipped chainsaw to cut through the house to make a new door.
Tags: iss114 | cloud security | saas | paas | Bruce Devlin
Contributing Author Bruce Devlin Click to read
The holistic approach to fighting piracy
Rory O Connor Now more than ever, consumers are driving the way that their content is delivered and consumed across platforms. Content owners increasingly need to be able to respond and adapt in an agile manner to deliver quality content across every consumer device from the day they hit the market.
Tags: iss102 | piracy | security | content | VOD | Rory O Connor
Contributing Author Rory O Connor Click to read
Advanced security solutions
David Leporini Helping pay-TV operators Keep an eye on piracy
Tags: iss091 | Viaccess-Orca | Security Solutions | piracy | David Leporini
Contributing Author David Leporini Click to read
Data security in the cloud
David Peto Cloud computing, forecast to become a 150 billion dollar industry by 2014, is not only growing, its transforming almost every industry. And it could transform TV and broadcast media too, especially when it comes to first mile production, collaboration and data security.
Tags: iss085 | data | security | cloud | storage | aframe | broadcast | production | David Peto
Contributing Author David Peto Click to read
Bob Pank starts counting cores...
Bob Pank# Once again BVE hosted its one-day Cloud seminar. The new ExCel location meant that the room was away from the show floor and ideal for concentrating on the words flowing from the experts. Full-on attention was needed as squeezing in nine sessions between 10.00 and 17.45 meant that each would be short, sharp and to the point, which was certainly the case for the two I attended.
Tags: iss075 | counting cores | bve | cloud seminar | security | files | the cloud | Bob Pank#
Contributing Author Bob Pank# Click to read
Protecting the archive
N/A Over the last 20 years or so we have all become accustomed to the expression asset management and, as ever, familiarity has bred contempt. In this case, the expression has become a loose descriptor for almost anything with a bit of a database in it. We need to stop and think about what we are trying to achieve.
Tags: iss070 | tmd | archive | storage | asset management | security | N/A
Contributing Author N/A Click to read
Understanding and Managing the Piracy Continuum
N/A Content owners, content distributors and security vendors have traditionally characterized digital pirates as a single malicious group with ill intentions. This, however, is seriously short-sighted because it is an overgeneralization that not only overshadows true consumer behavior, but results in misguided piracy mitigation tactics and missed revenue opportunities.
Tags: iss070 | irdeto | piracy | hacker | hacking | security | Piracy Continuum | N/A
Contributing Author N/A Click to read
New Solutions for Accelerated and Secure Movement of High-Value Content
N/A For broadcasters and media enterprises of all shapes and sizes, the ability to move critical content rapidly and securely from point A to point B has always been important but its never been so complex and rife with risk as in todays multiformat, multiscreen content delivery environment.
Tags: iss069 | security | multiformat | signiant | N/A
Contributing Author N/A Click to read
Eye to eye: How secure is your content?
N/A Unless you are in politics, the safest archiving policy can be summed up by just two words: Delete nothing.
Tags: security | content | filiform | lto | iss058 | N/A
Contributing Author N/A Click to read
CADLOCK - securing the future of broadcast.
N/A When absolute CAD, the Soho based broadcast installation experts released their range of rackmount products in 2007, it was to improve the way equipment was installed within a facility.
Tags: cadlock | iss034 | security | protection | the dongle lock | N/A
Contributing Author N/A Click to read
Five Best Practices for Securing Your Content during Collaboration
N/A A study by AT&T researchers concluded that for 77% of movies being traded on the internet, leaks originated by insiders. Screeners are a prime source but throughout the production and distribution cycle there are opportunities for security holes and unscrupulous profiteers.
Tags: pirates | protection | iss034 | signiant | security | secureftp | ftp | drm | watermarking | cdm | N/A
Contributing Author N/A Click to read
Eye to Eye: Content Protection 2009
N/A I took some time out during my IBC peregrination to see what the show had to offer in terms of content protection technology.
Tags: ibc2009 | iss034 | protection | security | autonomy virage | conax | philips | quative | securemedia | verimatrix | viaccess | N/A
Contributing Author N/A Click to read
Total Articles: 15 [1-15]