Technology

 

Cyberthreats to Gaming Companies and Gamers (Security Intelligence)

The video gaming landscape has changed drastically over the past few decades. Some of these changes have led to considerable developments in the cyberthreat landscape as it applies... More

Addressing Security Holes to Protect Valuable Content (NAGRA Blog)

In today’s M&E industry, to remain competitive, you must stay on your toes when it comes to innovation and evolution. From pay-TV operators to broadcasters and content owners, th... More

In 2020, IoT Security Must Be Part of Your Threat Management Strategy (Security Intelligence)

Internet-enabled devices are emerging more and more in business and personal environments. Often going unnoticed, they simply appear within network infrastructures, using wired or ... More

Gen Z Leading a New Wave of Internet Piracy (Motherboard)

Between Netflix, Hulu, and Disney+, it seemed like streaming giants might have finally won. Gen Z is proving that piracy will never die.... More

Dump Your Passwords, Improve Your Security – Really (CNET)

Passwords suck. They're hard to remember, hackers exploit their weaknesses and fixes often bring their own problems. ... More

Winning in the New Era of Digital Regulation (CPO)

The pace and complexity of regulatory requirements continues to grow globally, with no sign of slowing. For businesses, the challenges are not just that new regulations are being p... More

State of the Phish: IBM X-Force Reveals Current Phishing Attack Trends (Security Intelligence)

Phishing has long been an infection vector of choice for threat actors, and for good reason — it is relatively easy, inexpensive and consistently successful. In 2018 and 2019, at... More

Cisco, Microsoft Team to Control Growing IoT Networks (NW)

Cisco will meld its recently released Intelligent Edge software with Microsoft’s Azure IoT Hub to make transferring data from edge devices to applications in the Azure cloud simp... More

Enterprise Laptops Still Vulnerable to Memory Attacks (Decipher)

Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and ac... More

Why Azure Sphere From Microsoft is a Big Deal for the IoT Ecosystem (Forbes)

To ensure that security is an integral part of the connected solution, Microsoft has taken the lead in building an end-to-end platform built from the ground up. Branded as Azure Sp... More

Why Deepfakes are the Next Big Hacking Threat (OZY)

Over the past 30 years, the internet has gone from novelty to necessity. Predicting how we will stay safe in a hyper-connected world over the next 30 years is a hard task, but expe... More

The Persistent Humanity in AI and Cybersecurity (VentureBeat)

Even as AI technology transforms some aspects of cybersecurity, the intersection of the two remains profoundly human. Although that’s perhaps counterintuitive, it is front and ce... More

Banking Trojans and Ransomware – A Treacherous Matrimony Bound to Get Worse (SecurityIntelligence)

The financial malware arena became a mainstream issue a little over a decade ago with the rise of malware like the Zeus Trojan, which at the time was the first commercial banking T... More

Is AI Cybersecurity’s Salvation or its Greatest Threat? (VentureBeat)

If you’re uncertain whether AI is the best or worst thing to ever happen to cybersecurity, you’re in the same boat as experts watching the dawn of this new era with a mix of ex... More

Cinelytic: P2P File Sharing Shows OTT Demand, Demographics (DEG)

As competition for streaming viewers grows with the launch of new services from the major media companies, the entire industry is focused on what content consumers most want from t... More

Could Streaming Giants Start to Clamp Down on Password Sharing? (Marketplace)

Restricting password sharing doesn’t have an easy solution. Streaming providers are developing different approaches to combat the practice without having to institute Draconian m... More

Security, Content Protection High Priorities for Next-Gen TV (TV Technology)

Early in the ATSC 3.0 development process it became readily apparent that for prevention of content piracy or unsanctioned signal retransmission, and to enable the capability to ru... More

How to Future-Proof Subscriber Smart Homes? The Secret is Open Standards (Irdeto Perspective)

In any smart home project, integration with the operating systems on customer premises equipment like routers and gateways will inevitably impact on costs, timeline and deployment ... More

UK’s Cybersecurity Sector Now Worth £8.3B, But is a Skills Gap Looming? (CBR)

The UK’s cybersecurity sector is now estimated to be worth more than £8.3 billion, a significant rise of 46 percent from £5.7 billion in 2017, but a skills gap could be a major... More

Beware of ‘Graft’ on GDPR, CCPA (MarkLogic Blog)

Graph databases are very powerful and not generally involved in bribery. In fact, given its ability to discover fraudulent activity through the relationships it captures, a graph d... More

Sign up for our newsletters
* indicates required
MESA Newsletters