Research

 

Verimatrix, TELUS Team Up to Showcase First-of-Its Kind Piracy Protections for New Optik TV at IBC 2023

Verimatrix will showcase how Verimatrix Streamkeeper was integrated with the next generation of TELUS’ Optik TV platform to create an advanced, industrial-scale video content del... More

Router Authentication Security Risks: The Hidden Dangers of Weak CPE Credentials (Irdeto Insights)

Today, both consumers and Internet Service Providers (ISPs) are becoming increasingly aware of the potential risks associated with security breaches in broadband Customer Premises ... More

10 Benefits of Security Performance Metrics for CISOs (CSO)

There are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate key business alignment, among other benefits.... More

How Organizational Security Impacts Your Rights Management Vendor (FilmTrack Blog)

Whether you distribute media locally or internationally, your rights management vendor’s organizational security matters. The software your company uses to manage rights or track... More

How AI Can Help Address Emerging Supply Chain Risks (SCB)

EPAM's Boris Khazin writes that, 'Even when it’s available, the information needed to engage in rapid decision-making doesn’t always appear in an easily digestible form. AI and... More

Can Anyone Really Regulate AI? (Verdict)

Regulatory processes including business licences for AI models have been proposed, but is regulating AI applying an outdated solution to a novel problem?... More

How Organizational Security Impacts Your Rights Management Vendor (FilmTrack Blog)

Whether you distribute media locally or internationally, your rights management vendor’s organizational security matters. The software your company uses to manage rights or track... More

Data Security in an AI-First Paradigm (EPAM Blog)

Data is always moving. It isn’t new that organizations need to track data, their genealogy, understand how it moves and evolves, and know who has access to it. But the extremely ... More

How Generative AI is Creating New Music and Copyright Issues (H&K)

Who owns the copyright in these AI-generated tunes? It depends. Leaving aside cases of works made for hire, copyright in a work vests initially in the author or authors of work fix... More

4 Application Security Features You Need to Manage Your Entertainment Rights (FilmTrack Blog)

If you’re a media company tracking entertainment rights to hundreds, thousands, or perhaps millions of titles, the cybersecurity of your rights management application should prob... More

Unleashing the Power of Cross-Platform Video Streaming with PallyCon Multi-DRM Client SDKs for Flutter, React Native

These software development kits are engineered to empower cross-platform app development by seamlessly integrating DRM-protected video content into apps, while ensuring enhanced se... More

Chopin Cable Television Turns to NAGRA For Secure Streaming

Polish cable TV and fiber broadband provider Chopin Cable Television has tapped NAGRA and its OpenTV turn-key video platform to launch a new streaming offering, which will also be ... More

How an Undercover Content Moderator Polices the Metaverse (MIT)

The immersive nature of the metaverse means that rule-breaking behavior is quite literally multi-dimensional and generally needs to be caught in real time. Only a fraction of the i... More

Fortinet: What’s Next for Network Firewalls?

Firewalls have come a long way from their humble beginnings of assessing network traffic based on appearance alone. Today’s next-generation firewalls (NGFWs), which must protect ... More

7 Things Your Ransomware Response Playbook Is Likely Missing (Dark Reading)

Incident response experts share their secrets for success when it comes to creating a professional-grade ransomware response playbook. Are you ready for the worst?... More

Criminal Intent: Inside Bonus Abuse and Identity Theft (Sports Handle)

When you think about sports betting, the words “ringleader,” “dark web,” or “fraudsters” don’t necessarily come to mind. But those words offer a window into bonus abu... More

The Most-Requested Update For Fastly Developer Accounts

You asked, Fastly delivered — run your first two domains free on a Fastly developer account.... More

Techno-Plagiarism and the Battle For Music in a New Age of AI (Synctank)

At the heart of the uproar about generative AI and music is the argument that if you feed existing songs/recordings into an AI tool to “train” it, the end result will effective... More

The 4 Most Common Misconceptions About Mobile Anti-Tamper Technology (Irdeto Insights)

Mobile game hacking is continually adapting its approach to pirate titles and distribute them both to suspecting and unsuspecting gamers. Just to give you an idea of the size of th... More

Fortinet: Key Findings From the 2H 2022 FortiGuard Labs Threat Report

In the first half of 2022, FortiGuard Labs observed an overall increase in attack frequency paired with the explosive growth of new variants associated with familiar tactics. While... More

Sign up for our newsletters
* indicates required
MESA Newsletters