CDSA Exclusive

 

ME-ISAC: How to Protect Yourself and Your Organization From Phishing

Based on the huge number of phishing attacks seen over the past year, it is more important than ever to detect, educate and defeat these attacks on an organization’s employees an... More

Convergent Risks: How its Incident Response App Handles a Security Breach

There has been a significant increase in security breaches since the start of the pandemic and having an effective incident response game plan in place to deal with such emergencie... More

Irdeto: Make Sure to Secure Your AI From Bad Actors

Advancements keep being made in artificial intelligence (AI) and machine learning (ML) that are tools for both good actors and bad actors alike, so it is more  important than ever... More

HITS Spring: IBM Security CTO Details When to Consider ‘Zero Trust’

On May 12 at the annual Hollywood Innovation and Transformation Summit (HITS) Spring event, Jeff Crume, distinguished engineer, CTO of the Americas for IBM Security, and an IBM mas... More

Irdeto Talks Securing AI at May 12 HITS Spring

At the May 12 Hollywood Innovation and Transformation Summit (HITS) Spring event, Will Hickie, data science architect for Irdeto, will tout the wonders of artificial intelligence a... More

Richey May Technology Talks Reopening Trends May 12 at HITS Spring

After a year like no other, Hollywood is slowing getting back up to speed, ramping up the business of developing content for the world. But what trends and considerations should me... More

IBM Security CTO to Detail ‘Zero Trust’ Concept at HITS Spring

If you’re following a strict “zero trust” security policy or philosophy, you know who and what you can put your faith in: nobody and nothing at all. Whether or not that’... More

M&E Journal: An Insiders Look at the Billion-Dollar Pirate Subscription IPTV Business

When looking into the ever-evolving and growing world of IPTV piracy, it is difficult to fully grasp what it means when a recent investigative report, “Money for Nothing: The Bil... More

Richey May Technology: Remote Security Challenges Continue Into 2021

Media and entertainment companies have adapted to remote work since the start of the COVID-19 pandemic, but they continue to face security challenges,  according to Jacob Stremler... More

M&E Journal: The End of Co-Located, Physical Reviews

There is no doubt that the COVID-19 crisis has deeply changed our attitude to work. WFH is now the new standard in many geographies that have strict lockdown rules. Additionally, s... More

Convergent Risks Highlights the Development of Security Best Practices for Localization

Convergent Risks was asked to create a series of guidelines to help in the creation of a talent registry using security best practices, according to Mathew Gilliat-Smith, EVP at Co... More

Richey May: Virtual Desktops are the New Black Again

For the past year, media and entertainment organizations have faced challenges trying to find the right tools to work remotely amid the COVID-19 pandemic, and many of them have opt... More

IBM Security: Cybercriminals Took Advantage of Anti-COVID-19 Efforts

Threat actors used the socioeconomic, business and political challenges brought on by the COVID-19 pandemic to profit in 2020, targeting everything in the supply chain, from manufa... More

M&E Journal: How to Build Security Into the Development Process

Most mornings, I have a smoothie for breakfast. It’s packed with wholesome stuff: organic spinach, bananas, pea protein, cashew butter, and plenty of good ol’ H2O. Once I�... More

M&E Journal: Tracking Pandemic’s Piracy Impact

After a tumultuous nine months of living amid a pandemic, our lives will remain changed, knowing we won’t be attending a live event or going into a movie theatre as freely as we ... More

BuyDRM: 20 Years of Keeping Content Secure

Since 2001, Austin, Texas-based BuyDRM has had a singular focus: provide studio-approved multi-digital rights management (DRM) and other content security services for the entertain... More

Cyberhaven: How to Protect Sensitive Data With Context and Perfect Recall

There are pros and cons to legacy data loss prevention (DLP) technologies that are used to protect sensitive data and intellectual property, and there are several reasons why Cyber... More

Friend MTS: Don’t Forget the Pirates in the Room

With in-person events limited or canceled altogether, theaters closed, and sporting events playing out in empty stadiums and arenas, it’s safe to say consumer viewing habits have... More

CDSA Provides Update on App & Cloud Control Framework

The Content Delivery & Security Association (CDSA) used a session at the Dec. 8 virtual Content Protection Summit to provide an update on its App & Cloud Control Framework... More

CPS 2020: Akamai Equates Anti-Piracy Game to Chess

At the Dec. 8 virtual Content Protection Summit, Mark Barron, principal solutions engineer for Akamai, shared his company’s approach to piracy today. (more…)... More

Sign up for our newsletters
* indicates required
MESA Newsletters