Latest News

M&E Journal: How — and Why — For-Profit Piracy Works (CreativeFuture)

February 1, 2016 · Posted in Latest News · Comments Off on M&E Journal: How — and Why — For-Profit Piracy Works (CreativeFuture) 

By Chris Ortman, VP Communications & Corporate Affairs, CreativeFuture Piracy is a problem that affects the creative communities: major studios and networks, mini-majors and independents, distributors and exhibitors, book publishers, major and independent record labels, businesses that service the industry (caterers, florists, stylists, travel agents, etc.), as well as producers, directors, actors, writers, musicians, composers, recording […]

Government Task Force Recommends Changes to Copyright Act (CDSA)

February 1, 2016 · Posted in Latest News · Comments Off on Government Task Force Recommends Changes to Copyright Act (CDSA) 

By Chris Tribbey The U.S. Department of Commerce’s Internet Policy Task Force has released a set of copyright reform proposals, calling for more flexibility for courts when it comes to awarding statutory damages in copyright cases. The report recommends that the Copyright Act be updated to include a list of factors for courts and juries to […]

The Four Biggest Cyber Threats Facing Hollywood (Hewlett Packard Enterprise)

February 1, 2016 · Posted in Latest News · Comments Off on The Four Biggest Cyber Threats Facing Hollywood (Hewlett Packard Enterprise) 

Disney execs may now be sitting on the highest-grossing movie of all time (“Star Wars: The Force Awakens,” if you haven’t heard of it), but pity the folks who had to keep the film from falling into the hands of the dark side before its release. Like all movie, TV, music and video game content, the film […]

Common Security Mistakes in App Development (Independent Security Evaluators)

February 1, 2016 · Posted in Latest News · Comments Off on Common Security Mistakes in App Development (Independent Security Evaluators) 

When developing iOS applications, there are several ways to secure sensitive data that an application may handle. These measures may or may not be secure when the device is lost or stolen, which could lead to the loss in integrity of the sensitive data. Even when utilizing Apple’s provided security controls (e.g., keychain) for secure […]