Technology

 

Can Game Leaks Affect the Future of Your Game? (Irdeto Insights)

A game can be abused at any time during its lifetime, even on the first day of release. But have you ever imagined that the game can be damaged even prior to its release? This is, ... More

6 Trends Defining the Enterprise IT Market Today (CIO)

IT security is continuing to move toward a zero-trust security model, based on the idea that anything inside or outside an enterprise’s networks should never be implicitly truste... More

CISA Opens its Malware Snalysis and Threat Hunting Tool for Public Use (CSO)

The US Cybersecurity and Infrastructure Security Agency is opening a government tool for analyzing malware to all. The malware analysis tool has been available to .gov and .mil org... More

Visionular, EZDRM to Deliver Unmatched Video Streaming Efficiency with Enhanced Security

Visionular and EZDRM are announcing a strategic partnership that empowers content providers to deliver stunning video quality at low bitrates while ensuring robust content security... More

Step Into the Platform Era (Fortinet Blog)

It seems the platform conversation is a hot topic right now. But really, it’s nothing new. There has always been a debate across all industries about best-of-breed products versu... More

Irdeto Partners with CharIN e.V. and Takes on the ‘CharIN PKI’

Irdeto is set to take over the CharIN Public Key Infrastructure, adopting a novel open governance model. This customer-centric approach, with onboarded customers as part of the gov... More

OOONA Partners with Convergent Risks to Launch Security Course for the Media and Entertainment Industry

OOONA announces its collaboration with Convergent Risks to introduce a new security course for the media and entertainment industry. (more…)... More

Fortinet Introduces Expansive Upgrades to its Real-Time Network Security Operating System

The latest version of FortiOS, the only operating system that seamlessly converges networking and security, and Security Fabric updates deliver new generative AI, data protection, ... More

Sony’s Ci Media Cloud Launches New Advanced Watermark Security Package (TV Tech)

In addition to the Advanced Watermark Security add-on, Ci offers burn-in watermarks on the platform. Also built natively into MediaBox, users, and guests can download shared images... More

Iyuno’s McBride Promoted to CRO, Dembry Becomes CSO, CIO

Media localisation firm Iyuno has promoted industry veteran Nicky McBride to chief revenue officer and named Allan Dembry to the dual roles of chief security officer and chief info... More

Fortinet: Streamline Security Operations with New FortiGuard SOC-as-a-Service Integrations

Cybercriminals continually find new ways to infiltrate networks, forcing security professionals to evolve their operations to stay ahead of clever adversaries. Unsurprisingly, 52% ... More

How to Mitigate Risks with Performance Testing (Resillion Blog)

Performance testing is a catch-all term that includes various tests used to verify speed, scalability, and stability. Tests help identify and mitigate risks in all these critical a... More

Optimizing Cloud and Edge Resources in the Video Industry (TR)

Olga Kornienko explains how EZDRM is leveraging its extensive experience in digital rights management and cloud-based architectures to deliver innovative solutions to help its vide... More

Fastly Debuts a Unified Login Experience

Fastly announced the launch of a unified login experience across Fastly and Signal Sciences consoles to make it simpler and easier for you to access Fastly products and services. U... More

On-Premise Media Localisation Solutions for Content Security (XL8 Blog)

The foremost priority of the on-premise solution is to ensure that the contents never leave the client's infrastructure. The simplest way to achieve this is to cut off the server f... More

Detecting Compromised Passwords with HaveIBeenPwned and Fastly KV Store Integration (Fastly Blog)

In recent years, the frequent occurrence of data breaches and credential dumps has become an unfortunate reality. Due to the common mispractice of credential reuse, cybercriminals ... More

Sohonet: Best Way for Productions to Transfer Their Files in 2024

Production teams need to have an appropriate file transfer tool that can not only support the large amount of data that you are sharing but also complies to their parent studio’s... More

The Business of Romance Scams: Protecting Your Users and Your Brand (GeoComply Blog)

Online dating has become the most popular way for couples to meet, with over 40% of all US couples having found each other through online dating applications. Unfortunately, not ev... More

Is Hybrid Encryption the Answer to Post-quantum Security? (CSO)

Proponents believe hybrid encryption compensates for weaknesses in single post-quantum algorithms, but performance, complexity, and security concerns remain. ... More

Fastly: The Future of Device Detection on the Web

Knowing what kind of device is accessing your website can enable you to scale image resolutions up or down or adapt to device capabilities, delivering a better user experience for ... More

Sign up for our newsletters
* indicates required
MESA Newsletters