CDSA Exclusive
ME-ISAC: How to Protect Yourself and Your Organization From Phishing
Based on the huge number of phishing attacks seen over the past year, it is more important than ever to detect, educate and defeat these attacks on an organization’s employees an... More
Convergent Risks: How its Incident Response App Handles a Security Breach
There has been a significant increase in security breaches since the start of the pandemic and having an effective incident response game plan in place to deal with such emergencie... More
Irdeto: Make Sure to Secure Your AI From Bad Actors
Advancements keep being made in artificial intelligence (AI) and machine learning (ML) that are tools for both good actors and bad actors alike, so it is more important than ever... More
HITS Spring: IBM Security CTO Details When to Consider ‘Zero Trust’
On May 12 at the annual Hollywood Innovation and Transformation Summit (HITS) Spring event, Jeff Crume, distinguished engineer, CTO of the Americas for IBM Security, and an IBM mas... More
Irdeto Talks Securing AI at May 12 HITS Spring
At the May 12 Hollywood Innovation and Transformation Summit (HITS) Spring event, Will Hickie, data science architect for Irdeto, will tout the wonders of artificial intelligence a... More
Richey May Technology Talks Reopening Trends May 12 at HITS Spring
After a year like no other, Hollywood is slowing getting back up to speed, ramping up the business of developing content for the world. But what trends and considerations should me... More
IBM Security CTO to Detail ‘Zero Trust’ Concept at HITS Spring
If you’re following a strict “zero trust” security policy or philosophy, you know who and what you can put your faith in: nobody and nothing at all. Whether or not that’... More
M&E Journal: An Insiders Look at the Billion-Dollar Pirate Subscription IPTV Business
When looking into the ever-evolving and growing world of IPTV piracy, it is difficult to fully grasp what it means when a recent investigative report, “Money for Nothing: The Bil... More
Richey May Technology: Remote Security Challenges Continue Into 2021
Media and entertainment companies have adapted to remote work since the start of the COVID-19 pandemic, but they continue to face security challenges, according to Jacob Stremler... More
M&E Journal: The End of Co-Located, Physical Reviews
There is no doubt that the COVID-19 crisis has deeply changed our attitude to work. WFH is now the new standard in many geographies that have strict lockdown rules. Additionally, s... More
Convergent Risks Highlights the Development of Security Best Practices for Localization
Convergent Risks was asked to create a series of guidelines to help in the creation of a talent registry using security best practices, according to Mathew Gilliat-Smith, EVP at Co... More
Richey May: Virtual Desktops are the New Black Again
For the past year, media and entertainment organizations have faced challenges trying to find the right tools to work remotely amid the COVID-19 pandemic, and many of them have opt... More
IBM Security: Cybercriminals Took Advantage of Anti-COVID-19 Efforts
Threat actors used the socioeconomic, business and political challenges brought on by the COVID-19 pandemic to profit in 2020, targeting everything in the supply chain, from manufa... More
M&E Journal: How to Build Security Into the Development Process
Most mornings, I have a smoothie for breakfast. It’s packed with wholesome stuff: organic spinach, bananas, pea protein, cashew butter, and plenty of good ol’ H2O. Once I�... More
M&E Journal: Tracking Pandemic’s Piracy Impact
After a tumultuous nine months of living amid a pandemic, our lives will remain changed, knowing we won’t be attending a live event or going into a movie theatre as freely as we ... More
BuyDRM: 20 Years of Keeping Content Secure
Since 2001, Austin, Texas-based BuyDRM has had a singular focus: provide studio-approved multi-digital rights management (DRM) and other content security services for the entertain... More
Cyberhaven: How to Protect Sensitive Data With Context and Perfect Recall
There are pros and cons to legacy data loss prevention (DLP) technologies that are used to protect sensitive data and intellectual property, and there are several reasons why Cyber... More
Friend MTS: Don’t Forget the Pirates in the Room
With in-person events limited or canceled altogether, theaters closed, and sporting events playing out in empty stadiums and arenas, it’s safe to say consumer viewing habits have... More
CDSA Provides Update on App & Cloud Control Framework
The Content Delivery & Security Association (CDSA) used a session at the Dec. 8 virtual Content Protection Summit to provide an update on its App & Cloud Control Framework... More
CPS 2020: Akamai Equates Anti-Piracy Game to Chess
At the Dec. 8 virtual Content Protection Summit, Mark Barron, principal solutions engineer for Akamai, shared his company’s approach to piracy today. (more…)... More