Technology

Stanbury: Third-Party Audits More Crucial Than Ever

It’s a truth about the state of content security today: while the level of effort to cause damage coming from hackers and content pirates is surprisingly low, the level of effort... More

Caringo: Object Storage Helps Protect Data from Ransomware

Amid concerns over high-profile ransomware attacks, protecting data is a growing concern for many organizations. Object storage solutions may offer some relief. That’s accordi... More

NSS Labs: Choose Wisely with Next-Gen Firewalls

To help stop emerging cybersecurity threats at the perimeter, enterprises are looking at a bevy of next-generation firewall (NGFW) options today, controls that feature all sorts of... More

Following the Kodi Crackdown (OTT2)

In the media industry, there’s no dirtier word right now than “Kodi.” The popular media management software is under siege, and the once vibrant ecosystem that supported it i... More

Three Ways to Protect Your Data in the Cloud (Time)

For consumers, the cloud is a big blessing: It lets them store huge amounts of information—music, messages, photos and so on—at little or no cost. Thanks to a wide array of ser... More

IBM: 6 Ways Businesses Can Protect Against Ransomware Like Petya (Forbes)

On June 27, organizations in over 65 countries reported they had been infected with Petya ransomware. Petya ransomware was first discovered in March 2016, and like most malware, it... More

Why Enterprise Security Needs a New Focus (DarkReading)

WannaCry appeared to be the catastrophic global cybersecurity breach we've long been expecting, but despite the damage caused, the full possible magnitude of the threat was never r... More

Oracle Adds AI, Machine Learning Tech to Cloud Security Offerings (CDSA)

Building on the positive response to its Identity-based Security Operation Center (SOC) cloud services, Oracle has announced a series of developments that enhance the portfolio's ... More

Simple Ways to Avoid Malware Across Devices (TechRepublic)

If the recent WannaCrypt attack is any indication, the continued wave of malicious software is not about to fade into the distance. And so, everyone with a keyboard and a mouthpiec... More

Your SaaS Provider May Not Have Your Security Covered (SC Media)

As the first decade of cloud computing draws to a close, confidence in the way SaaS- and cloud service providers manage data protection and security is very high. Occasionally surv... More

LADB First Post-Production Service Certified Under ISO 22301

Los Angeles Duplication & Broadcasting (LADB) announced May 24 that it’s been certified under the International Organization for Standardization (ISO) standard 22301, making ... More

Fortium Technologies, Object Matrix Partner on Content Security Solutions for Improved Media Protection

Object Matrix and Fortium Technologies have launched a joint solution offering secure media management for digital content archive storage. It combines security certified solutions... More

The Best Digital Offense Starts With the Best Security Defense (Cisco)

We have been talking about digitization for a while now, and the fact that it's disrupting every industry. But, the conversation has shifted. Companies no longer debate whether or ... More

Cyberattacks Again Roil Hollywood … Can Anything be Done About It? (L.A. Times)

Like most large corporations, major Hollywood studios are fond of outsourcing. From coming attraction trailers that are designed to draw audiences into cinemas to eye-popping 3D... More

Five Security Lessons WannaCry Taught Us the Hard Way (Dark Reading)

The scope and severity of the fallout from the WannaCry attacks elicits plenty of "we told you so" head shakes about the dangers of ransomware. With a lightning-fast speed, the bla... More

Not Investing in Cybersecurity Has ‘Inverse ROI’ (TechTarget)

If the cyberattacks that infected computers in more than 150 countries this month did anything good, they have shown organizations the world over what not keeping systems up to dat... More

XML vs. JSON: A Security Perspective (Independent Security Evaluators)

XML and JSON are both universal formats for arbitrary data sharing between computer architectures and programs, but there are a number of differences between them. These difference... More

Stopping Ransomware Starts With Your Inbox, Cybersecurity Professionals Say (KQED)

A screenshot of a virus-infected computer has been floating around the internet in stories about the recent worldwide ransomware attack that spread across more than 150 countries a... More

Digital Watermark Leads Police Straight to Bollywood Pirates (Naked Security)

Movie pirates have been running amok in recent months – hacking TV series and pre-release films from Netflix and Walt Disney and causing HBO to batten down the hatches with 2FA a... More

X-Files and Videotape: The Early Days of Internet Piracy (CNET)

Today, content flows so freely and easily within moments of broadcast at the speed of light, delivered in torrential clusters that separate what you get from any real person who ha... More