Oh no, back to haunt you….. the thorny subject of piracy keeps rearing its ugly head again. Attracting and retaining viewers, increasing market share, keeping all those digital plates spinning, lowering TCO – if you are running a streaming service, there are any number of other pressing priorities. And surely it should be job done tackling streaming piracy provided basic security provisions and contractual obligations are in place, right?
You must be joking. Streaming pirates are not only stealing content but stealing entire streaming services including hosting super aggregated rival services of their own and, as our latest research conducted by Ampere Analysis reveals, they are laughing all the way to the bank as they spirit away over $30 billion rightfully belonging to video service providers.
View More
Business resilience depends on reliable cybersecurity, but relying only on traditional security tools can leave aspects of your business vulnerable. Resilience for digital business starts with high availability and scalability – guaranteeing performance and uptime for websites and apps, no matter what levels of traffic are thrown at them. This can be achieved with caching technologies.
View More
As an industry, we talk a lot about “business continuity” or “disaster recovery.” But what we actually mean is “revenue protection.”
View More
When designing a storage system for a production or post facility, it is easy to concentrate on capacity and throughput, and think that is all you need. However, a very real issue is data safety and how to guard against it. That is a particular problem in our industry of media production. Once you start considering the issues around data loss, the potential problems start to escalate: a real domino effect.
View More
Synchronization is a fundamental requirement in all content generation and broadcast; used extensively both in SDI / HDI formats and in IP packet based systems. Synchronization signals are typically generated from equipment including sync pulse generators, master sync references, and for the IP format, Precision Timing Protocol (PTP) grandmaster clock generators. Most sync generators encapsulate a very accurate internal clock which is synchronised to an external reference, which for the vast majority of manufacturers is a GPS & GNSS satellite timing signal. Consequently sync generators are connected to an outside GNSS antenna via coaxial cable or fibre optic cable, like those supplied by ViaLite Communications.
View More
John O’Loan is CEO at iOMedia Group LNS. After launching Sky News, he assisted in the launch and operations of more than 40 other news, sport and documentary channels around the world. He holds an Executive Masters Degree in Culture Change at HEC Paris and The University of Oxford. In this article, he discusses how companies can best protect themselves from cyber threats.
View More
Unlike a car crash, a ransomware attack is most likely uninsurable. So, the effects on a major media enterprise, production company or post facility can be totally devastating. Here’s why we should all be concerned, however big or small an organisation.
View More
The sudden shift to remote working within the media industry saw an incredible turnaround, with workflows being instated quickly to ensure that quality content creation could continue. Existing media tools were adapted to enable workers from around the globe to access content and contribute to production, all whilst the industry came to terms with wider logistical challenges. A quick rollout of infrastructure saw big changes in how the industry managed their assets; suddenly, data that would have been very difficult to access needed to be available to workers from their homes.
View More
Even with the global cost of online crime reaching $6 trillion by 2021.
Even with 50% more cyber-attacks per week on corporate networks in 2021.
Even with the world’s most influential technology leaders claiming cybercrime to be the greatest threat to every company in the world.
…the fact of the matter is most broadcasters are woefully underprepared when it comes to protecting their businesses from cyber-attacks. And this is a big problem.
View More
The recent IABM report on content security trends in conjunction with our good friends at Axinom made for some interesting reading. As Roger Thornton mentions in his summary article, perhaps the most surprising takeaway is the discrepancy between a stated intention to invest in content, and a far lower priority in investment in content security technology to safeguard against the theft of that content, especially given the financial, operational and potentially creative resources that will be required to produce or acquire it. As Roger summarises, this seems counterintuitive, but budgets are finite and it could be argued that prioritizing content over business processes is where dutiful media providers should concentrate their majority resource.
View More