The recent IABM report on content security trends in conjunction with our good friends at Axinom made for some interesting reading. As Roger Thornton mentions in his summary article, perhaps the most surprising takeaway is the discrepancy between a stated intention to invest in content, and a far lower priority in investment in content security technology to safeguard against the theft of that content, especially given the financial, operational and potentially creative resources that will be required to produce or acquire it. As Roger summarises, this seems counterintuitive, but budgets are finite and it could be argued that prioritizing content over business processes is where dutiful media providers should concentrate their majority resource.
Zero Trust; the new security paradigm for a multi-connected world
Media companies are connecting across more platforms, services, and networks all the time and securing content or broadcast/streaming data has never been more important… and more difficult.
IABM UK Members’ Council debates Cyber Security
The issue of cyber security hits on many levels – corporate, product, system and individual. All of these are apparent within the Broadcast Industry with attitudes as well as actions to cyber security increasingly changing, driven in no small part by the rapid adoption of new cloud-based workflows and ‘direct to consumer’ strategies. Below the UK Members’ Council have been given 30 minutes to ‘debate’ two opposing statements around cyber security and what it means for the Broadcast industry.
As Threats Increase, M&E Organizations Must Secure Valuable Data
Cybersecurity has become an increasing concern over the past decade as a result of several high-profile attacks and organizations need to secure valuable data.
Examining the Public Cloud Archive Paradox
A discussion of best practices and alternative cost-effective archive solutions for on-going content protection
What are the benefits of using server racks?
Every industry has valuable equipment that is fundamental to how their organisation performs, whether it be in the defence and military sector or in the broadcasting field. With this reliance on expensive equipment comes the need for suitable storage solutions and ways to ensure the protection of property. This is where server racks come in handy. Server racks can be used for many different purposes and are the ideal solution for keeping equipment safe and secure. There are numerous advantages of using server racks including them offering an improved level of security and neatly organising space. Here at CP Cases, we have decided to go that extra mile to offer customisable options for your server racks, designing them specifically so that they are more fitting and beneficial to your personal needs.
Managing Cybersecurity Risk In Distributed Content Handling Environments
The last 24-months have seen substantial disruption to facilities in M&E by virtue of the COVID-19 pandemic. Facilities have been forced to embrace new paradigms including work from home, and adopt new workflows that incorporate SaaS and PaaS based offerings. This talk will examine how facilities should review their approach to cybersecurity risk, risk assessment, and risk treatment in distributed environments. We will also take a brief look at emerging technologies such as SD-WAN, SASE, and ZTNA that may help in reducing risk in these distributed environments.
Technology & Trends Roadmap Part 1
A cool feature of the IABM Technology and Trends Roadmap is that at a high level it gives us a visual overview of the anomalies and irregularities within our industry that directly affect growth and profitability. Our panel will examine these conflicts and how they affect business and risk. Part 1 will take on the three areas of: Distributed Infrastructure (Home Studios, Backhaul, Workstations, Cloud Production Switching), Compute and Storage (GPU, CPU, FPGAs, NVME, PCIe, SSD), along with Security.
Cyber security strategies for modern file and object workflows
File and object workflows are here to stay. This session will cover key strategies to protect file and object in private and hybrid cloud architectures. Including the full data lifecycle comprises of production , cool and cold data.
In Conversation with Irdeto
In this IABM TV interview, Shane McCarthy (Chief Operating Officer, Irdeto) gives an overview of the latest technologies in video entertainment & content protection that Irdeto has launched in the past few years.