CDSA News Headlines

 

The Ins and Outs of CDN Leeching: The Next Generation of Online Video Piracy (Irdeto Insights)

Video piracy has emerged as one of the persistent threats looming over the video entertainment industry, with ever-evolving techniques created to bypass content security measures. ... More

MIT Report Details New Cybersecurity Risks (MIT Sloan)

Despite rigorous security efforts by all organizations, cybercriminals are still finding new ways to exploit personal and business data. Data breaches increased by nearly 20% in th... More

Fortinet: New FortiXDR Capabilities Offer Expanded Coverage

Organizations increasingly face challenges in effectively managing and securing the many disparate components of their digital environments, ranging from mobile devices to servers ... More

XL8 Clears SOC 2 Type II Audit, Enhancing Data Security

XL8 announced the successful completion of a System and Organization Controls (SOC) 2 Type II audit, performed by Sensiba LLP. Developed by the American Institute of Certified Publ... More

Securing the Future of Streaming: Scalstrm and EZDRM Strategic Partnership

Scalstrm and EZDRM announced their strategic partnership aimed at expanding the envelope of video content security for broadcasters, OTT providers, and other streaming video platfo... More

Golden Globes Screeners Go Digital-Only as Organization Teams with Indee on Streaming Platform (THR)

The service, which will help content providers reach hundreds of Globes voters spread around the world, is being facilitated by Indee, which also handles secure streaming for PGA A... More

What Will Cyber Threats Look Like in 2024? (CSO)

Analyzing incidents in the past will help advise a stronger cybersecurity strategy in the future—2024 and beyond. ... More

Securing the AI-Enabled Software-defined Vehicle (Arm Blog)

New Armv9-based Automotive Enhanced IP processors integrate the latest Arm security features that are designed to protect software-defined vehicles. ... More

A New Era for CISOs: Navigating Regulations and Unprecedented Threats (IW)

By fostering strong relationships and adapting frameworks to industry-specific regulations, CISOs can navigate the changing landscape and better prepare their companies for cyber t... More

Quantum is Coming – and Bringing New Cybersecurity Threats With It (KPMG Insights)

The quantum-computing revolution is upon us — a paradigm shift in computing power that harnesses the laws of quantum mechanics to solve problems far too complex for today’s cla... More

Weekend Patch Report, April 28, 2024 (SecureTheVillage)

Important Security Updates The following lists current versions of common software programs. Items in Bold have been updated in the past week. If you use these programs, you sho... More

Featured Jobs: Veritone; Sony Pictures; FilmTrack

Principal Data Scientist, AI Labs — Remote — Veritone Manager, Music Publishing & Copyright — Culver City, CA — Sony Pictures Software Engineer — LA — FilmTrack Clic... More

The Counterspy Effect: Operational Efficiency and the End of Piracy Losses (Verimatrix Blog)

Maria Malinkowitsch, Director of Product Management at Verimatrix, and Dr. Klaus Schenk, SVP of Security and Threat Research at Verimatrix, discuss how Counterspy is setting new st... More

5 Predictions: How AI, Data Privacy and Cybersecurity Could Transform Legal Practices (KPMG)

Today’s legal teams are challenged by rapid technological innovations. Generative AI and other new technologies are being adopted across legal functions and broader businesses at... More

Enterprises are Getting Better at Detecting Security Incidents (CD)

Google Cloud’s Mandiant saw significant improvements in how organizations track down threats, yet hackers are still abusing common threat vectors.... More

Ford Trucks Partners with Irdeto for Advanced Key Management, Electronic Control Units Software Signing Services

This collaboration marks a significant milestone in Ford Trucks’s commitment to enhancing the cybersecurity framework of its trucks and components in line with the latest industr... More

Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery (The Hacker News)

Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breache... More

Cybersecurity in a Data-Driven World: The Problem of Invalid Data (Forbes)

Cyber risk is now recognized at the board level. The result is organizations are increasing their cyber budgets to keep up with the evolving threat landscape, with unprecedented vi... More

EZDRM: Las Vegas Reflections

The overall EZDRM team experience was distinctly positive, confirming our strong inclination towards a solutions perspective and major partner pre-integrations that reduce risk and... More

Weekend Patch Report, April 21, 2024 (SecureTheVillage)

Important Security Updates The following lists current versions of common software programs. Items in Bold have been updated in the past week. If you use these programs, you sho... More

Sign up for our newsletters
* indicates required
MESA Newsletters