Latest News

NSS Labs Report: IPS Vendors Making Strides (CDSA)

December 15, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

NSS Labs’ latest round of testing of intrusion prevention systems (IPS) found IPS vendors are making big strides in lowering the total cost of ownership and improving performance, though some services require a lot more upkeep than others.

The IPS services tested included Check Point 13500, Dell SonicWALL SuperMassive E10800, Fortinet FortiGate-D3600C, HP TippingPoint S7500NX, IBM GX7800, Juniper SRX5800, McAfee NSD9100, McAfee NSD9200, Sourcefire 7120 and Stonesoft 3206.

Read more

Content Creators: Piracy Enabling ‘A Lost Generation’ (CDSA)

December 15, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

HOLLYWOOD, Calif. — John Landgraf, CEO of FX Networks, looks at Internet piracy today, and offers a simple comparison for those who steal: The same amount of money and man hours can be spent constructing both a building and a movie, yet only the latter is considered open season for theft.

And that makes him — in his words — furious.

Read more

Piracy Experts: Disrupt the Money (CDSA)

December 15, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

HOLLYWOOD, Calif. — Elisha Lawrence, associate VP of global anti-piracy and content security for TV network ABS-CBN Intl., noticed something important when she first started looking at the habits of those who pirate content.

“Just a little frustration on the consumer’s part will result in them moving on,” she said Dec. 9, speaking during a panel at the fifth annual Content Protection Summit. If the goal is to keep consumers pointed toward legitimate sites, she has a mantra for everyone in the anti-piracy business: “frustrate and redirect.”

Read more

Sony Pictures Attack Called ‘Unprecedented’; PlayStation Network Attacked (CDSA)

December 8, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

An internal memo at Sony Pictures Entertainment relays the severity of the recent hacker attack against the studio, with the head of the security firm investigating the breach calling the attack “unprecedented.”

“The malware was undetectable by industry standard antivirus software and was damaging and unique enough to cause the FBI to release a flash alert to warn other organizations of this critical threat,” Kevin Mandia, head of security firm Mandiant, wrote in the memo attained by Recode.

“In fact, the scope of this attack differs from any we have responded to in the past, as its purpose was to both destroy property and release confidential information to the public. The bottom line is that this was an unparalleled and well planned crime, carried out by an organized group, for which neither SPE nor other companies could have been fully prepared.” Read more

North Korea Suspected in Sony Film Leaks (CDSA)

December 1, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

High-quality versions of five Sony Pictures films — four that have yet to be released in the United States — have been leaked online, following a Nov. 24 hack of the studio’s computer systems, and the studio is investigating whether North Korea is behind it all.

Brad Pitt’s war film “Fury,” which was released Oct. 17, is the biggest name among the leaked films, with “Annie” (Dec. 19), “Mr. Turner” (Dec. 19), “Still Alice” (Jan. 16) and “To Write Love on Her Arms” (March) the four films that have yet to be released.

The leak of the Sony films marks perhaps one of the biggest Hollywood piracy incidents ever, and certainly the biggest since the mid-July theft of Lionsgate’s “Expendables 3,” which hit BitTorrent sites about three weeks before theaters. On Nov. 25, London police announced the arrest of two men in that theft, which the film’s producers said cost them millions in lost revenue.

The leak followed the Nov. 24 hack of Sony Pictures Entertainment’s internal network, forcing the studio to shut down its worldwide network through the holiday weekend. A group calling itself Guardians of Peace (GOP) claimed responsibility for the hack, and had threatened to release information it had acquired if unspecified demands were not met.

“The theft of Sony Pictures Entertainment content is a criminal matter, and we are working closely with law enforcement to address it,” Sony told the Los Angeles Times. A Reuters report said Sony Pictures Entertainment has hired cyber security company FireEye Inc’s Mandiant forensics unit to mop up the damage, and that the FBI was investigating the incident.

Rob Enderle, principal analyst with San Jose, Calif.-based technology advisory firm The Enderle Group told the Media & Entertainment Services Alliance (MESA) that it’s all but certain that North Korea is behind the initial hack and subsequent leaks, with the isolated nation following through on its threats against Sony for the upcoming Seth Rogen and James Franco film “The Interview.”

Read more

Sohonet CTO on Meeting the Security Challenges of the Cloud

November 2, 2014 · Posted in Latest News · Comments Off 

Following his presentation “Meeting the Security Challenges of the Cloud” at the Content Protection Summit in London on Oct. 29, Sohonet chief technology officer Ben Roeder answered some focussed questions on cloud storage and associated security issues.

Sohonet has historically been a network service provider. Why are you now moving your attention towards “the cloud”?

We have provided additional services besides basic networking for many years. Historically we have provided these solutions on site. However, the increasing speed of networks and the vast increase in the capacity of storage mediums means that we now have the ability to scale our solutions to meet the needs of an industry that processes large amounts of data

The word “cloud” has arguably become an overused media buzzword. What does it mean to you?

To me, “cloud” simply means utility services consumed through an API. However, the word is massively overused and it is often applied to anything that involves computers and networks. For our customers, it means benefiting from the combined use of shared resources accessed by high-speed connectivity in a world where networking is not the barrier it once was.

Read more

HP: Cost of Cyber Crime Escalates

October 27, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

The average cost of cyber crime for American organizations is up nearly 100% year over year to $12.7 million, according to a recent study by HP Enterprise Security and the Ponemon Institute.

The findings of HP’s annual “Cost of Cyber Crime” study also found that the time it takes to resolve a cyber attack has grown by 33% since 2013, with the average cost incurred to resolve a single attack costing than $1.6 million.

Read more

Atkinson to Keynote Content Protection Summit Europe

October 27, 2014 · Posted in Latest News · Comments Off 

Richard Atkinson, chairman of the Content Delivery & Security Association (CDSA) and global director of piracy conversion for Adobe, will be the keynote speaker at this week’s Content Protection Summit: Europe, a first-time collaborative event between the CDSA and the Media & Entertainment Services Alliance: Europe.

The event — supported by media partner Cue Entertainment — will be held Oct. 29 at The Mayfair Hotel in London, and will feature senior-level discussions about the state of content security in the media and entertainment industries

Read more

The Impact of Illegally Recorded Theatrical Titles

October 20, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

We hear all the time that BitTorrent downloads of films still in theaters — illegally filmed and uploaded — are the bane of the studios’ existence, and a major contributor to lost box office revenue.

However, the link between illegal downloads and lost ticket sales may be overstated, according to Apas Laboratory, an independent research firm out of Montreal. Read more

WebLife Balance: Lowering Liability is Key

October 20, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

It’s just a fact: Employees are going to use their work computers for personal use.

Making sure that personal use — whether it be with Facebook or checking your bracket during March Madness — doesn’t come back to hurt the employer (piracy, malware, cyber threats and the like) is where WebLife Balance comes in.

The Woodland Hills, Calif.-based company was born out of the need to balance the needs of employees and employers, keeping both parties satisfied in a world where the work day rarely runs 9-5.

David Melnick, CEO of WebLife Balance, took the time to chat with the Content Delivery & Security Association and the Hollywood IT Society about the past, present and future of his company.

Read more

Civolution: Four Ways to Fight Premium Sports Piracy (CDSA)

October 13, 2014 · Posted in Latest News · Comments Off 

Pay TV providers are spending more than ever on the rights to broadcast major national and international sports. They’re also facing more piracy threats than ever to that content, especially as pay TV operators increasingly offer sports via OTT and TV Everywhere services.

Pascal Marie, senior director of sales channels and partners at Civolution, recently shared several ways pay TV operators can mitigate the threat of piracy for sports programming:

1. Assess the level of illicit re-streaming in high-quality HD

According to Viaccess-Orca, the live rebroadcast threat doubles every six months as viewers choose to watch live sports on cheap illegal rebroadcast websites, which can offer high quality content in HD. A growing portion of sports audiences watch and share content over peer-to-peer (P2P) technologies, in which case there is no way to send any take-down notice. The illicit streams are increasingly high-quality (HD) video with a nice user experience.

The Role of Search Engines in Piracy (CDSA)

October 1, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

It turns out search engines just might play a role in whether consumers choose to steal content or buy it.

That’s according to a new study out of Carnegie Mellon University (CMU) in Pittsburgh, which sought to find out whether search results actually do influence consumers’ choices for piracy when legal consumption channels are readily available.

CMU researchers figured there was only one way to find out whether search engine results influence piracy choices: design a customized search engine that allowed them to manipulate pirated and legal links in search results; use the engine to conduct separate experiments on college-aged and general users; and randomly assign users to a control condition or to conditions where infringing sites or legal sites were artificially promoted in search results.  Read more

Gartner: Worldwide Information Security Spending at All-Time High (CDSA)

August 27, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

Considering all the recent, high-profile cyber security breaches, it’s a scary time for governments, businesses and consumers. But these constant security threats also mean big business for those working to protect information.

A new report from research firm Gartner has worldwide information security spending hitting $71.1 billion by the end of 2014, an 8% year-over-year increase, with the data loss prevention segment seeing the largest annual growth (19%). And with the increasing use of mobile, cloud and social services necessitating more security feature, Gartner doesn’t see the cyber security business slowing down: in 2015, nearly $77 billion will be spent to secure content and information.

Read more

Black Hat: Lessons For Hollywood

August 6, 2014 · Posted in Latest News · Comments Off 

By Bryan Ellenburg

Just a few hours into the Black Hat USA 2014 Conference, one thing is clear:  The systems used to capture, store, transform, distribute, and archive Media Entertainment Content (Features & Television) are under constant siege.  Corporate data, networks, and websites are also constantly being probed for vulnerabilities and backdoors into systems holding valuable Intellectual Property and Confidential Information.  Simple social engineering exercises can lead to the introduction of malware, opening the gateway for criminals and hackers entree into these systems.  Conferences include security panels on “Data Protection at Massive Scale”, “Building a Continuous Security Program for Your Global Perimeter”, “Mobile Device Mismanagement”, and “The State of Incident Response”.  The Black Hat USA 2014 event is held at the Mandalay Bay in Las Vegas, Nevada, from August 6th to August 7th.  Details on the event can be found at www.blackhat.com.

Lionsgate Works to Plug ‘Expendables 3’ Leaks (CDSA)

August 6, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

On July 31 Lionsgate filed a lawsuit against those responsible for allegedly leaking “The Expendables 3” weeks ahead of the film’s Aug. 15 theatrical release. That appears to be just the beginning of the studio’s pushback against those helping share the film online.

Lionsgate has reportedly tasked several online anti-piracy tracking firms (including Thomas Reuters’ MarkMonitor, the U.K.’s Entura International, and Los Angeles’ IP Echelon) with sending out thousands of takedown notices to Web sites associated with pirated copies of the film.

Read more

Google Glass Causing Entertainment Industry Concerns (CDSA)

July 30, 2014 · Posted in Latest News · Comments Off 

By Chris Tribbey

Comic-Con has become the go-to event for studios to debut footage for their next summer blockbuster, those multi-million dollar films that rule the box office and home entertainment. And a recording of exclusive footage shared at the event can have a serious impact on how studios market the content.

So it’s no surprise that this year’s event in San Diego saw a new restriction for Comic-Con attendees: zero tolerance for Google Glass, the wearable eyewear technology that can take pictures, access real-time, Web-enabled information, and (most worrisome for content owners) record video in 720p, all using simple voice commands.

Read more

Condé Nast, Avalon Consulting Headline MarkLogic Metadata Webinar (MESA)

July 30, 2014 · Posted in Latest News · Comments Off 

By Garrett Randall

In the media and entertainment space, metadata has become an increasingly crucial component when it comes to monetizing digital assets.

How studios and other media and entertainment companies are streamlining their businesses with metadata solutions will be the topic of discussion July 30, when San Carlos, Calif.-based NoSQL database company MarkLogic hosts a unique Webinar: “Metadata is the New Gold.”

Read more

SMU Partners with Krimmeni for Cyber Security Research (CDSA)

July 23, 2014 · Posted in Latest News · Comments Off 

By Bryan Ellenburg

Cloud-enabled cyber security software company Krimmeni Technologies has been tapped by Southern Methodist University (SMU) in Dallas, to help research cyber security issues prevalent in connected devices.

SMU’s Darwin Deason Institute for Cyber Security in the Lyle School of Engineering will work with Krimmeni to look at addressing cyber security problems when it comes to hardware security modules (computing devices meant to safeguard and manage digital keys for authentication).

Read more

Civolution Set for IBC (CDSA)

July 23, 2014 · Posted in Latest News · Comments Off 

By Garrett Randall

Civolution is set to share its latest Automatic Content Recognition (ACR) and content protection solutions Sept. 11-16 at the International Broadcasting Convention (IBC) in Amsterdam.

Highlights for Civolution at the show include the latest news on the company’s SyncNow ACR technology and new functionality for its NexGuard Streaming suite of content protection solutions.

Read more

New Looks at Hollywood’s Piracy Problem (CDSA)

July 16, 2014 · Posted in Latest News · Comments Off 

By Bryan Ellenburg

The assumption about piracy has long been that once a new theatrical release hits the file sharing sites, the box office take for that film will be significantly impacted.

But that just may not be the case, according to economist Koleman Strumpf, a professor with the University of Kansas School of Business, who conducted one of the most extensive piracy studies to date.

Read more

Next Page »