CDSA News Headlines
The Ins and Outs of CDN Leeching: The Next Generation of Online Video Piracy (Irdeto Insights)
Video piracy has emerged as one of the persistent threats looming over the video entertainment industry, with ever-evolving techniques created to bypass content security measures. ... More
MIT Report Details New Cybersecurity Risks (MIT Sloan)
Despite rigorous security efforts by all organizations, cybercriminals are still finding new ways to exploit personal and business data. Data breaches increased by nearly 20% in th... More
Fortinet: New FortiXDR Capabilities Offer Expanded Coverage
Organizations increasingly face challenges in effectively managing and securing the many disparate components of their digital environments, ranging from mobile devices to servers ... More
XL8 Clears SOC 2 Type II Audit, Enhancing Data Security
XL8 announced the successful completion of a System and Organization Controls (SOC) 2 Type II audit, performed by Sensiba LLP. Developed by the American Institute of Certified Publ... More
Securing the Future of Streaming: Scalstrm and EZDRM Strategic Partnership
Scalstrm and EZDRM announced their strategic partnership aimed at expanding the envelope of video content security for broadcasters, OTT providers, and other streaming video platfo... More
Golden Globes Screeners Go Digital-Only as Organization Teams with Indee on Streaming Platform (THR)
The service, which will help content providers reach hundreds of Globes voters spread around the world, is being facilitated by Indee, which also handles secure streaming for PGA A... More
What Will Cyber Threats Look Like in 2024? (CSO)
Analyzing incidents in the past will help advise a stronger cybersecurity strategy in the future—2024 and beyond. ... More
Securing the AI-Enabled Software-defined Vehicle (Arm Blog)
New Armv9-based Automotive Enhanced IP processors integrate the latest Arm security features that are designed to protect software-defined vehicles. ... More
A New Era for CISOs: Navigating Regulations and Unprecedented Threats (IW)
By fostering strong relationships and adapting frameworks to industry-specific regulations, CISOs can navigate the changing landscape and better prepare their companies for cyber t... More
Quantum is Coming – and Bringing New Cybersecurity Threats With It (KPMG Insights)
The quantum-computing revolution is upon us — a paradigm shift in computing power that harnesses the laws of quantum mechanics to solve problems far too complex for today’s cla... More
Weekend Patch Report, April 28, 2024 (SecureTheVillage)
Important Security Updates The following lists current versions of common software programs. Items in Bold have been updated in the past week. If you use these programs, you sho... More
Featured Jobs: Veritone; Sony Pictures; FilmTrack
Principal Data Scientist, AI Labs — Remote — Veritone Manager, Music Publishing & Copyright — Culver City, CA — Sony Pictures Software Engineer — LA — FilmTrack Clic... More
The Counterspy Effect: Operational Efficiency and the End of Piracy Losses (Verimatrix Blog)
Maria Malinkowitsch, Director of Product Management at Verimatrix, and Dr. Klaus Schenk, SVP of Security and Threat Research at Verimatrix, discuss how Counterspy is setting new st... More
5 Predictions: How AI, Data Privacy and Cybersecurity Could Transform Legal Practices (KPMG)
Today’s legal teams are challenged by rapid technological innovations. Generative AI and other new technologies are being adopted across legal functions and broader businesses at... More
Enterprises are Getting Better at Detecting Security Incidents (CD)
Google Cloud’s Mandiant saw significant improvements in how organizations track down threats, yet hackers are still abusing common threat vectors.... More
Ford Trucks Partners with Irdeto for Advanced Key Management, Electronic Control Units Software Signing Services
This collaboration marks a significant milestone in Ford Trucks’s commitment to enhancing the cybersecurity framework of its trucks and components in line with the latest industr... More
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery (The Hacker News)
Cybersecurity breaches can be devastating for both individuals and businesses alike. While many people tend to focus on understanding how and why they were targeted by such breache... More
Cybersecurity in a Data-Driven World: The Problem of Invalid Data (Forbes)
Cyber risk is now recognized at the board level. The result is organizations are increasing their cyber budgets to keep up with the evolving threat landscape, with unprecedented vi... More
EZDRM: Las Vegas Reflections
The overall EZDRM team experience was distinctly positive, confirming our strong inclination towards a solutions perspective and major partner pre-integrations that reduce risk and... More
Weekend Patch Report, April 21, 2024 (SecureTheVillage)
Important Security Updates The following lists current versions of common software programs. Items in Bold have been updated in the past week. If you use these programs, you sho... More