Technology
Are Mobile Phones Becoming a Hacker’s Dream? (Forbes)
While many of us are well-versed in security measures for devices such as laptops, we may forget about mobile phones. There are many different types of software we can download and... More
Taking Gaming Security to the Next Level (NAGRA Blog)
Clara Jezouin considers the gaming industry and how the need to protect pre-release content sits alongside the new opportunities created by technologies such as blockchain, NFTs an... More
OTT Service Theft: Why Your Tokens are a Pirate’s Best Friend (Synamedia Blog)
Before diving in, however, let’s remind ourselves of what makes OTT video streams so tempting and susceptible to piracy. Unlike traditional pay TV services, which leverage anti-p... More
Veritone Introduces New AI-Powered Video Forensics Solution
Veritone unveiled Veritone Tracker, a new AI-powered tracking solution that leverages confidence-based similarity detection to track people and objects through video recognition so... More
PallyCon’s Distributor Watermark Now Detects 30 Seconds Video Length For Post Production, Pre-Release Workflow
PallyCon has launched an advanced version of its distributor watermarking solution—PallyCon Distributor Watermarking v2.0—that can detect piracy information from video clips as... More
Ransomware: This is How Half of Attacks Begin, and This is How You Can Stop Them (ZDNet)
Cybersecurity researchers warn that attackers are mostly using two different techniques to break into systems.... More
High-Stakes Security and Speed (Fastly Blog)
Margaret Arakawa, Fasty CMO, recently had a chat with Michael Taylor, IT Director for Mercedes-AMG PETRONAS Formula One Team. They discussed the role cloud technology and security ... More
Hackers are Testing a Destructive New Way to Make Ransomware Attacks More Effective (ZDNet)
Cyber criminals are testing a new method of cyber extortion. It could be very worrying.... More
OpSec Introduces David Butler, Sr. Director of New Business Development for Online Brand Protection
Butler joins OpSec with a wealth of experience in the intellectual property and brand protection market, having held senior sales and business development roles at some of the indu... More
Strengthen Your Security With Policy Analytics for Azure Firewall (Azure Blog)
Network security policies are constantly evolving to keep pace with the demands of workloads. With the acceleration of workloads to the cloud, network security policies—Azure Fir... More
Microsoft Rolls Out Passwordless Sign-On for Azure Virtual Desktop (Dark Reading)
Azure says cloud-native single sign-on with a passwordless option is most-requested new AVD feature in the product's history.... More
Video Game Protection is Not as Expensive as You Think (Irdeto Insights)
You just launched a game with great potential. Gamers are swarming over and playing it. You already imagine your title becoming a great success – also financially. But soon enoug... More
Irdeto and Twise Expand CI Plus 2.0 Ecosystem (DTE)
The new tech combines Irdeto Cloaked CA technology and Twise latest CI Plus stack tailored for MT5711 Mediatek chipsets to comply with security requirements including CI Plus ECP b... More
archTIS Launches NC Encrypt to Address Growing Demand for Independent Encryption Key Management (Proactive)
Encryption of sensitive data in Microsoft 365 cloud applications and SharePoint on-premises is important for data security and compliance - especially with the surge in remote work... More
Mobile In-Game Ads: How to Prevent Players Blocking Them (Irdeto Insights)
True, in-game ads can be annoying. No wonder some people want to get rid of them – especially on mobile devices – which are mostly used on the go. The proliferation of ad block... More
Wipro, Palo Alto Networks Expand Alliance to Deliver Managed Security, Network Transformation
Offerings include managed SASE, Network Transformation, Cloud Security, and NextGen SOC solutions based on Zero Trust principles to drive digital acceleration. (more…)... More
Data Poisoning and Its Impact on Cyber and AI (TM)
Data poisoning is becoming more dangerous than traditional attacks. Instead of attacking from the outside, data poisoning attempts to make the inputs accepted into the training dat... More
Denuvo by Irdeto Joins AWS for Games Initiative to Support Game Developers
Denuvo by Irdeto announced its support for the AWS for Games initiative from Amazon Web Services to provide video game security services, including Denuvo Anti-Tamper, Anti-Cheat a... More
NAGRA, Harmonic Debut Live Sports Watermarking Solution
Content security and multi-screen user experience solutions firm NAGRA has launched a new live sports streaming watermarking-as-a-service offering with video delivery tech company ... More
Vision Media Selects EZDRM to Offer Robust Video Security
Vision Media has recently selected EZDRM to help add an additional level of workflow integration to their leading secure screening platform. Vision Media is working with EZDRM to i... More