When we reached out to production and post houses to find out about your approach to remote workflows and end-point security, we quickly discovered that the first rule of remote workflow security seems to be that you do not talk about remote workflow security. Because there’s a chance that sharing information about how you keep your content secure could be what puts your security at risk…and some of you are worried about revealing just how vulnerable your workflows are. When we did finally manage to convince a handful of post professionals and security specialists to break the silence, what they shared were some hard truths.
Amagi – Shielding your secrets using secure local vault
Exposure of credentials has emerged as a leading cause of data breaches across organizations. Verizon’s 2023 Data Breach Investigations Report reveals that external actors were involved in 83% of data breaches, with stolen credentials being exploited in 49% of these breaches. Furthermore, such breaches have severe consequences for businesses. According to IBM’s 2023 Cost of Data Breach Report, stolen or compromised credentials contributed to approximately 15% of data breaches, resulting in losses of $4.62 million.
Baishan Cloud On Demand Webinar – Asia online market is on the rise: CDN and cloud security are keys to stable content delivery
Boosted by COVID-19, the Internet users in China is reaching 1 billion. At the same time, 10 million Southeast Asians enter the “mobile age” every year, making this region the most engaged mobile users in the world. However, few organizations have robust security methods to protect businesses from being attacked by hackers or malicious attacks. In this webinar, you will learn more in-depth insights into Internet markets in China and Southeast Asia, cloud security challenges, and how BaishanCloud can help deliver your content smoothly and safely.
In Conversations with Cloudian – November 2020
We speak to Cloudian Principal Architect, M&E Solutions David Phillips about their Ransomeware protection products and flash object storage.
Cloudian – How the media and entertainment industry can protect media asset libraries against ransomware
What is putting M&E businesses at risk and how can they effectively protect their media assets against the growing ransomware threat?
Friend MTS – Attacks on Subscriber Watermarking Technologies
Pirate attacks on watermarking technologies are ever-evolving, tend to exploit their weakest points and attempt to re-engineer and break their structure. To be effective against piracy, it is essential that watermarking is highly robust against all attempts at tampering, as well as more sophisticated collusion and image processing attacks. In this presentation, we will review and analyze watermarking technologies and known real-world attacks on them.
Securing content in a new era of distributed workflows
James Wilson, Head of Aspera Engineering & Operations at IBM, will explore cloud security technology innovations helping media organizations adapt to new, secure ways of working now and in the future—including forensic watermarking-as-a-service, key management integration and BYOK, and credentials encryption.
James will also discuss the importance of cloud-native strategies for remote workflows and how container-based Kubernetes environments will enable media organizations to manage and secure their infrastructure and workflows consistently across applications.
IABM Webinar – What Vendors need to know about Cyber Security
Often having a cyber security plan gets forgotten - until it is too late. Too late doesn't necessarily mean being hacked or possibly be subject to ransomware; it could be not being prepared to respond to an RFP or RFQ. Having a clear view of broadcasters' requirements is most important.