Research

 

Enterprise Laptops Still Vulnerable to Memory Attacks (Decipher)

Attackers can exploit vulnerabilities in how laptops use memory to force the machine to execute unauthorized code while it is booting up, giving them unauthorized privileges and ac... More

Cinelytic: P2P File Sharing Shows OTT Demand, Demographics (DEG)

As competition for streaming viewers grows with the launch of new services from the major media companies, the entire industry is focused on what content consumers most want from t... More

Beware of ‘Graft’ on GDPR, CCPA (MarkLogic Blog)

Graph databases are very powerful and not generally involved in bribery. In fact, given its ability to discover fraudulent activity through the relationships it captures, a graph d... More

Archivists are Saving the History of Internet Piracy (Vice)

An ongoing project to catalog the history of piracy has just topped the 300 gigabyte mark, with a goal of offering a searchable index of more than 5 terabytes of piracy-related met... More

It’s Time for the Industry to Look at Content Protection Through a Different Lens (NAGRA Blog)

There are different ways to view and approach this, whether it’s providing protection for smaller operators looking to scale into larger ones or larger services scaling horizonta... More

The Rise of Machine Learning to Manage Dark Data (TechNative)

For years we have been wasting time and resources pushing aside the benefits of dark data, unconsciously dismissing the great potential it can offer a business or industry.... More

Putting Data Security at the Heart of Digital Transformation – From Culture to Code (Cloud Tech)

In the new digital economy, data is the most valuable asset a company possesses. However, according to a recent survey by IDC, the spending ceiling for data security is as low as s... More

Protecting Smart Cities (TechNative)

The benefits are clear: Smart cities will be more convenient, more efficient, and more pleasant to live in and visit. However, smart cities are also a bit of a double-edged sword, ... More

IBC 2019: MESA Members Bringing Storage, Cloud Tech

New cloud applications, top storage technologies and full platforms for media and entertainment companies will be on hand at IBC 2019 from members of the Media and Entertainment Se... More

Cybersecurity Challenges for Smart Cities: Key Issues and Top Threats (Help Net Security)

Urban population is on the rise worldwide and smart city development projects are harnessing the power of the Internet of Things to develop more intelligent, efficient, and sustain... More

Is AI Fundamental to the Future of Cybersecurity? (CSO)

Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.... More

Google to Set Up a European Tech Hub to Deal With Data Privacy (CNBC)

Google will more than double its team of privacy experts in Germany as Europe looks to ramp up regulation of Big Tech and user data. CEO Sundar Pichai announced in a blog post on T... More

Security Flaws Already Found in 5G Technology (Security Today)

5G is the talk of the town when it comes to the next generation of cellular technology, and now that the first 5G-capable phones and networks are starting to roll out experts are s... More

When Combating Emerging Social Media Attacks, Don’t Try to Swim Against the Current (Security Intelligence)

The greatest threats to the enterprise are often those that use social engineering to extract information or data from employees. For threat actors, this tactic rarely requires any... More

Inside the Development of Netflix Stethoscope (Decipher)

One of the major challenges facing many organizations, even technically sophisticated ones with mature security groups, is securely configuring endpoints and ensuring they stay tha... More

When it Comes to Cybersecurity, Passive Defense is Best (Undark)

The deluge of cyberattacks sweeping across the world has governments and companies thinking about new ways to protect digital systems. For a long time, cybersecurity experts have e... More

Predicting the Future of Next-Gen Access and Zero Trust Security in 2019 (Forbes)

The most valuable catalyst all digital businesses need to continue growing in 2019 is a Zero Trust Security strategy based on Next-Gen Access that scales to protect every access po... More

Machine Learning Will Transform How We Detect Software Vulnerabilities (Security Intelligence)

No one doubts that artificial intelligence (AI) and machine learning will transform cybersecurity. We just don’t know how or when. While the literature generally focuses on the d... More

How to Prepare for the Coming 5G Security Threats (Security Intelligencer)

Over the next few years, the pace of business will accelerate exponentially. 5G will enable the future enterprise technologies everyone is predicting and waiting for: fleets of sel... More

Big Data is Causing a Surge of Data Breaches – Here are Some Solutions (SDC)

Data breaches can happen at multiple levels. Among a recent surge of data breaches, the ones with the greatest publicity are usually those affecting prominent websites or online se... More

Sign up for our newsletters
* indicates required
MESA Newsletters