Research

 

Fastly Wins at the 2024 DEVIES Awards

Fastly OHTTP Relay won the 2024 DEVIES award for best innovation in services: application development! The OHTTP provides fast, reliable separation and isolation of data about who ... More

CISOs Tackle Compliance With Cyber Guidelines (IW)

The more information chief information security officers can uncover about their security and tech stack, the better off they will be.... More

FortiFlex: More Solutions Now Available Through Fortinet’s Flexible Licensing Program

People, data, and devices are everywhere, requiring organizations to frequently evolve their business strategies to meet new demands. At the same time, cybercriminals are advancing... More

When it Comes to OT, if You’re Standing Still, You’re Falling Behind (Fortinet Blog)

With the rise of cyberattacks on critical infrastructure and the proliferation of connected industrial devices, OT security is more important than ever.... More

Deepfake-Generating Apps Explode, Allowing Multimillion-Dollar Corporate Heists (DarkReading)

Deepfakes are fast becoming more realistic, and access to them more democratic, enabling even ordinary attackers to enact major fraud. What's the most effective way to fight back?... More

One Third of Streamers Still Sharing Passwords (TV Tech)

Amid a crackdown on password sharing nearly half were very worried or somewhat worried that streaming services would crackdown on the practice, according to Horowitz.... More

Wasabi: 7 Reasons to Use Backup as a Service

The main upside to using an “As-a-Service” service is that you only pay for what you use, eliminating the significant upfront cost and barrier to entry. For corporate data back... More

ISE: The Advantages of Manual Testing

Manual testing plays a crucial role in ensuring the security of a system or application that handles sensitive assets. While vulnerability scans can provide valuable insights, they... More

New Poll Reveals Washingtonians Want Stronger Online Protections for Kids and Teens

A new poll finds that Washington state residents have strong concerns about the risks that social media platforms pose to children's well-being and privacy. The survey of 596 Washi... More

How to Ensure Your Monitoring Solutions Represent a Return on Investment (Friend MTS Blog)

Content security is a necessary investment for all content owners, rights holders and broadcasters, but how can you tell if it’s a cost that will not only deliver security benefi... More

Fortinet and the Gartner Hype Cycle for Zero Trust Networking

Organizations are actively developing and implementing zero-trust strategies to mitigate the risks in today’s ever-evolving cybersecurity landscape. Gartner projects that “by 2... More

Unlocking Super Aggregation: Navigating the Opportunities and Challenges (Irdeto Insights)

Super aggregation, at its core, is about bringing together a diverse array of content and services. From premium sports, studios, premium apps, niche and local content to digital s... More

Unified Management Is the Key to Single-Vendor SASE (Fortinet Blog)

It’s no secret that SASE has skyrocketed in popularity in recent years due in large part to how the solution provides strong threat protection and secure access no matter where a... More

How Physical Security Protects Your Company’s Digital Assets (Digital Silence Blog)

Businesses with troves of sensitive information are often worried whether their digital assets are secure. And rightfully so. Publicly reported cases of data compromises spiked 114... More

Surface and Protect Authentication Endpoints with Login Discovery (Fastly Blog)

As organizations grow, it’s common for security administrators to have more applications to manage and have less communication with the primary application developers.... More

Capture Lost Revenue by Limiting Concurrency With DRM (BuyDRM)

Because most DRM providers charge based on the volume of licenses that are consumed, and since the very basis of the feature requires a DRM license to be renewed every 10-30 second... More

Verimatrix, TELUS Team Up to Showcase First-of-Its Kind Piracy Protections for New Optik TV at IBC 2023

Verimatrix will showcase how Verimatrix Streamkeeper was integrated with the next generation of TELUS’ Optik TV platform to create an advanced, industrial-scale video content del... More

Router Authentication Security Risks: The Hidden Dangers of Weak CPE Credentials (Irdeto Insights)

Today, both consumers and Internet Service Providers (ISPs) are becoming increasingly aware of the potential risks associated with security breaches in broadband Customer Premises ... More

10 Benefits of Security Performance Metrics for CISOs (CSO)

There are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate key business alignment, among other benefits.... More

How Organizational Security Impacts Your Rights Management Vendor (FilmTrack Blog)

Whether you distribute media locally or internationally, your rights management vendor’s organizational security matters. The software your company uses to manage rights or track... More

Sign up for our newsletters
* indicates required
MESA Newsletters