Crisis has always been a powerful catalyst for social change and there no doubt the COVID-19 pandemic is proving the same. As we adapt to the new normal the popularity of streaming services has grown dramatically as isolation creates more free time. Launched in November 2019, Disney+ recently announced that they have surpassed 50 million paying subscribers.
Along with that rise there’s been a similar rise in a whole range of cyber security threats on these streaming services. In fact, one of the key focus of Privacy Awareness Week is the importance of safeguarding personal information as we spend more time online.
Are you doing all you can to protect your applications? Two out of three applications fail basic security tests, leaving entry points for hackers to steal IP and sensitive data, obtain cryptographic keys, or hijack the application for malicious purposes.
Application hardening makes it difficult to reverse engineer your app and protects any vulnerabilities from being exploited. Learn techniques and best practices and to shield your applications from attack in our “Practical guide to application hardening.”
The media and entertainment industry has quickly developed into a prime target for ransomware. Organizations as large and diverse as Disney, Sony and France’s M6 Group have all been affected by cyberattacks in recent years.
Research from Forrester Consulting indicates that more than half of organizations (51%) in the M&E sector experienced three or more cyber-attacks in just 12 months, while Sophos’ ‘State of Ransomware 2020’ report found that media and entertainment is among the industries most affected by ransomware, with 60% of organizations hit last year.
With the average cost of a TV show on a major network or streaming service at nearly $6 million dollars per episode, the inability to access even a small portion of key files can be financially disastrous for production companies.
So, what is putting M&E businesses at risk and how can they effectively protect their media assets against the growing ransomware threat?
Technology is transforming the world at a rapid pace. If you work on the cybersecurity front, you should not only deal with the reality today, but also have a vision of your long-term security strategy in the new era empowered by artificial intelligence, 5G and IPv6. As these technologies will have a profound impact on how we protect our data and digital assets in the future, we will take a close look at their specific implications on cybersecurity in this article.
The world is contending with an increasing amount of cyber threats today: Tb-level DDoS attacks have become a new normal; web application threats are on the rise; crawler attacks are steadily increasing. The ever-more sophisticated cyberattacks have placed the data and assets of corporations, governments and individuals at constant risk. This research report, produced by BaishanCloud in partnership with Beijing Digital World Consulting*, aims to shed some light on the global internet security landscape by investigating three key types of cyberattacks (web application, DDoS, businessscenario-based attacks), and inform coping strategies for internet security professionals.
Teresa Cheung (Managing Director HK) and Jackson Chow (Technical Manager) discuss TestWizard, Eurofins’ Open Test Automation Infrastructure, and their cyber security testing service.
IPE has been in business as a system integrator for 35 years and still is, but for the last 10 years its flagship, proprietary Intelligent Display System (IDS) has been the dominant factor in taking the company forward. And with some equally intelligent siblings from IPE now entering the market it is a good time to celebrate 10 years of IDSuccess.
This article originally appeared in the IABM Journal, issue 100 which is available to view online here John Ive Director of Strategic Insight IABM If the threat of cyber-attack is not yet keeping you awake at night, it is a major concern for many broadcasters and media companies – and if vendors haven’t yet been asked about their product or service’s resilience to cyber-attacks, they will soon. The ever-increasing connection between back-office and front office systems makes not only media organizations’ business systems vulnerable, but also their media assets. You may not hear about such attacks often because the reputational damage is at the very least highly embarrassing for companies, but they are happening with increasing frequency. The attack on Sony Pictures Entertainment in 2014 may have been politically motivated, but such attacks can equally be for financial gain –ransoming assets for example, or obtaining customer personal and financial data for criminal exploitation. Even a grudge or grievance can be the starting point for a highly damaging cyber-attack. TV5Monde was the subject of just such an attack in 2014 –and was only saved from irreparable damage by good fortune – an engineer with the right skills and knowledge happened to...
This article originally appeared in the IABM Journal, issue 102 which is available to view online here Lorenzo Zanni Research Analyst IABM If the threat of cyber-attack is not yet keeping you awake at night, it is a major concern for many broadcasters and media companies – and if vendors haven’t yet been asked about their product or service’s resilience to cyber-attacks, they will soon. TV5Monde was the subject of just such an attack in 2014 – and was only saved from irreparable damage by good fortune – an engineer with the skills and knowledge happened to be on-site, and was able to identify and shut down the portal through which the attack was being conducted just in time. Alongside theft of data and media assets, Denial of Service (DoS) or worse, DDoS (Distributed Denial of Service) is also on the increase, as organizations that don’t share a particular broadcaster or media company’s view of the world come under highly sophisticated cyber-attack in an effort to shut down their operations and damage their infrastructures and reputations. Recently, there has been a growing number of well-publicised ransomware attacks where cyber criminals encrypt a company’s data and will only release the key...
David Meltzer – CTO, TripWire History confirms when it comes to cyber security that one particular pattern always holds. Disconnected systems start to become connected together, and over time these move from proprietary little known protocols to open standards, leading to a proliferation of new applications and uses. Soon these systems are not secure. New vulnerabilities are discovered then security is retrofitted back in. This session reveals how this pattern occurred, and how to apply the lessons learned from other industries to build resilent, secure environments in IP-connected broadcast systems. [maxbutton id="130" ] [maxbutton id="131" ]