Jigsaw 24 Media – Some hard truths about remote workflow security

Jigsaw 24 Media – Some hard truths about remote workflow security

Skip to content
IABM
Login / Register
The MediaTech Vantage account needs to be created. Please contact the administrator
Menu
  • Home
  • Join IABM
    • Join IABM
    • Benefit Comparison Grid
    • Global Engaged Partner Program
    • Affiliate Membership Program
    • Trade Show Support
    • IABM Member Companies
  • News
    • All News
  • Knowledge Hub
      • Topics
          • Topics
          • Ad Tech
          • Adjacent Markets
          • AI/ML, Data & Analytics
          • At-Home/Remote Production
          • Business Models
          • Cloud & Virtualization
          • Consumer Habits & Experiences
          • Data Privacy & Management
          • Digital & Social
          • Digital Transformation
          • Edge Computing
          • Financials, Investment & M&A
          • Imaging
          • Immersive
          • Insight & Analysis
          • IP Transport & Networking
          • Mobile
          • Next-Gen Hardware
          • Next-Gen Standards
          • OTT & Streaming Platforms
          • Programming & Creative
          • Rights & Legal
          • Sales & Marketing
          • Security
          • Skills & Education
          • Social Media
          • Supply Chain
          • Sustainability & Inclusion
          • Content Chain Elements
          • Create
          • Produce
          • Manage
          • Publish
          • Monetize
          • Connect
          • Support
          • Store
          • Consume
      • IABM Journal
          • Journal CoverJournal 133 Cover
          • Journal 133
          • Journal 132
          • Journal 131
          • Journal 130
          • Journal 129
          • Journal 128
          • Journal 127
          • Journal 126
          • Journal 125
          • Journal 124
          • Journal 123
          • Journal 122
          • Journal 121
          • View all
      • Spotlight Reports
  • MediaTech Intelligence
    • MediaTech Vantage
    • MediaTech Radar
    • Bespoke Research
  • Skills & Development
    • Training Courses
    • E-Learning Courses
    • Training Partners
    • Student Awards
  • Our Community
    • IABM Team
    • IABM Members’ Board
    • Member Councils
      • Americas’ Council
      • APAC Council
      • DACH Council
      • EMEA Council
      • UK Council
    • IABM Business Standard
    • Honorary Members
  • Events & CatchUp
    • Events Calendar
    • IABM Supported Events
    • NAB Show 2025 Content
    • In Conversation with
    • IABM 2024 Content
  • Technology
    • Technology & Trends Roadmap
    • Standards Monitoring Group
    • Standards Activities
  • BaM™ Shop Window
    • Search the BaM™ Shop Window
    • BaM™ Shop Categories
    • BaM™ Shop Window Product Submission
    • BaM™ Shop Window FAQ’s
    • BaM Content Chain
  • Dealer Directory

IABM Journal

Search the IABM Knowledge Hub


Tag: cyber security

Jigsaw 24 Media – Some hard truths about remote workflow security

When we reached out to production and post houses to find out about your approach to remote workflows and end-point security, we quickly discovered that the first rule of remote workflow security seems to be that you do not talk about remote workflow security. Because there’s a chance that sharing information about how you keep your content secure could be what puts your security at risk…and some of you are worried about revealing just how vulnerable your workflows are. When we did finally manage to convince a handful of post professionals and security specialists to break the silence, what they shared were some hard truths.

View More

Amagi – Shielding your secrets using secure local vault

Exposure of credentials has emerged as a leading cause of data breaches across organizations. Verizon’s 2023 Data Breach Investigations Report reveals that external actors were involved in 83% of data breaches, with stolen credentials being exploited in 49% of these breaches. Furthermore, such breaches have severe consequences for businesses. According to IBM’s 2023 Cost of Data Breach Report, stolen or compromised credentials contributed to approximately 15% of data breaches, resulting in losses of $4.62 million.

View More

Baishan Cloud On Demand Webinar – Asia online market is on the rise: CDN and cloud security are keys to stable content delivery

Boosted by COVID-19, the Internet users in China is reaching 1 billion. At the same time, 10 million Southeast Asians enter the “mobile age” every year, making this region the most engaged mobile users in the world. However, few organizations have robust security methods to protect businesses from being attacked by hackers or malicious attacks. In this webinar, you will learn more in-depth insights into Internet markets in China and Southeast Asia, cloud security challenges, and how BaishanCloud can help deliver your content smoothly and safely.

View More

In Conversations with Cloudian – November 2020

We speak to Cloudian Principal Architect, M&E Solutions David Phillips about their Ransomeware protection products and flash object storage.

View More

Cloudian – How the media and entertainment industry can protect media asset libraries against ransomware

What is putting M&E businesses at risk and how can they effectively protect their media assets against the growing ransomware threat?

View More

Friend MTS – Attacks on Subscriber Watermarking Technologies

Pirate attacks on watermarking technologies are ever-evolving, tend to exploit their weakest points and attempt to re-engineer and break their structure. To be effective against piracy, it is essential that watermarking is highly robust against all attempts at tampering, as well as more sophisticated collusion and image processing attacks. In this presentation, we will review and analyze watermarking technologies and known real-world attacks on them.

View More

Securing content in a new era of distributed workflows

James Wilson, Head of Aspera Engineering & Operations at IBM, will explore cloud security technology innovations helping media organizations adapt to new, secure ways of working now and in the future—including forensic watermarking-as-a-service, key management integration and BYOK, and credentials encryption. James will also discuss the importance of cloud-native strategies for remote workflows and how container-based Kubernetes environments will enable media organizations to manage and secure their infrastructure and workflows consistently across applications.

View More

IABM Webinar – What Vendors need to know about Cyber Security

Often having a cyber security plan gets forgotten - until it is too late. Too late doesn't necessarily mean being hacked or possibly be subject to ransomware; it could be not being prepared to respond to an RFP or RFQ. Having a clear view of broadcasters' requirements is most important.

View More

IABM Platinum Members

IABM Gold Members

IABM
View all Members

Connect. Support. Inform

  • twitter_icon
  • ln_icon

  • About Us
  • Contact Us
  • IABM Privacy Policy
  • IABM Cookie Policy

© 2025 IABM IABM is company limited by guarantee. Registered in England No: 5262009. Registered Office: IABM, 5 Deansway, Worcester, WR1 2JG

X