Latest News

RIAA Calls for Changes to ‘Broken’ DMCA (CDSA)

April 4, 2016 · Posted in Latest News · Comments Off on RIAA Calls for Changes to ‘Broken’ DMCA (CDSA) 

By Chris Tribbey

The Recording Industry Association Of America (RIAA) is calling for changes to the “broken” Digital Millennium Copyright Act (DMCA), with more than 400 artists, writers, managers and music organizations sending comments to the U.S. Copyright Office, the RIAA announced.

The group wants the Copyright Office to take the burden of policing the internet for instances of copyright theft off the shoulders of content creators, and instead shift at least part of that responsibility to technology companies and content distributors.

Additionally, the RIAA announced that 18 separate music organizations have submitted a 100-page joint brief that they say exposes the flaws in the “antiquated” 1998 DMCA. More than 40 music managers filed a separate brief.

Read more

NSS Labs: IT Teams are Overwhelmed (CDSA)

March 28, 2016 · Posted in Latest News · Comments Off on NSS Labs: IT Teams are Overwhelmed (CDSA) 

By Chris Tribbey

For today’s IT teams, the sheer amount of malware out there can be daunting to look at. Billion of URLs are used for the delivery of malware, with approximately 100 million malware samples “in the wild,” according to Neal Hartsell, EVP of marketing and product management at NSS Labs.

Instead of trying to watch for each piece of malware, IT teams need to look at the active exploits being used instead, Hartsell said during an NSS Labs security presentation. “IT teams continue teams continue to be given loads and loads of data, but it’s hard to turn that security data into actionable work that will guard against critical threats,” he said.

NSS Labs estimates that 97% of all breaches come as a result of just a couple hundred commercially available exploit kits. Further, NSS Labs found that 60% of vulnerabilities discovered in apps deployed on enterprise networks go unmitigated, and it takes an average of 176 days for the problem to even be discovered. Read more

Content Security Experts: No Easy Answer to Hollywood’s Screener Problem (CDSA)

March 28, 2016 · Posted in Latest News · Comments Off on Content Security Experts: No Easy Answer to Hollywood’s Screener Problem (CDSA) 

By Chris Tribbey

LOS ANGELES — It was hard to find anyone in favor of DVD screeners at the March 22 Content Protection Briefing event. But attendees and speakers at the event sure know why they still exist.

They’re a “perk” for awards voters, “swag” for guild members, and — depending on who you talk to — still the only way some studio executives want to deal with early release content.

Following last year’s massive leak of newly released theatrical films right around Christmas, many due to leaked DVD screeners, speakers at the Content Protection Briefing (a special summit produced by the Content Delivery & Security Association and the Media & Entertainment Services Alliance) offered their thoughts on what it’ll take for Hollywood to make the change to digital screeners full time. Read more

Digital Screeners to be Tackled at ‘Content Protection Briefing’

March 21, 2016 · Posted in Latest News · Comments Off on Digital Screeners to be Tackled at ‘Content Protection Briefing’ 

By Chris Tribbey

How do media and entertainment companies secure digital screeners within the content supply chain? Are digital screeners really set to replace the days of shipping out a DVD? And what exactly is the current and future state of digital screeners in Hollywood?

These topics will be tackled by a bevy of the media and entertainment industry’s top security experts  March 22 in Los Angeles, when the Content Delivery & Security Association (CDSA) and the Media & Entertainment Services Alliance (MESA) hold a unique Content Protection Briefing.

The March 22 event, running from 4-6 p.m. at the Line Hotel in Koreatown, will see content owners like Paramount and Turner, technical experts like Microsoft, eFilm, Deluxe, MediaSilo and Civolution, all together offering their thoughts on how Hollywood does screeners today, and how they’ll continue doing it in the days ahead. Read more

Civolution, Azure, Deluxe Reps to Tackle the State of E-Screeners (CDSA)

March 14, 2016 · Posted in Latest News · Comments Off on Civolution, Azure, Deluxe Reps to Tackle the State of E-Screeners (CDSA) 

By Chris Tribbey

Toward the end of 2015, Hollywood was hit with a massive wave of piracy, with most every major blockbuster and every major awards winner seeing a leaked version released online.

A peer-to-peer sharing group claimed responsibility for a large swath of the early releases, taking credit for pirated copies of Joy, Steve Jobs, Bridge of Spies, Creed, Spotlight, Legend, In The Heart of The Sea, The Danish Girl, Concussion and the new James Bond film Spectre, among others.

And it was all due to screeners, the group, Hive-CM8, claimed.

What the media and entertainment industry can do to stem this problem will be front and center March 22 in Los Angeles, when the Content Delivery & Security Association (CDSA) and the Media & Entertainment Services Alliance (MESA) holds a unique Content Protection Briefing, bringing Hollywood’s top security experts together to tackle the topic “The Current and Future State of E-Screeners.”

Read more

MediaSilo: Piracy Doesn’t Have to be a Cost of Doing Business (CDSA)

March 7, 2016 · Posted in Latest News · Comments Off on MediaSilo: Piracy Doesn’t Have to be a Cost of Doing Business (CDSA) 

By Chris Tribbey

The origin story of Boston-based MediaSilo goes like this: In 2007, the company’s founder Kai Pradel (then-owner of a local video production agency) spent more than a month sending DVDs back and forth between a client, trying to get approval for a video testimonial.

That exhausting experience led Pradel and his team to debut a better way of sharing professional media: a streaming platform that adapts to new workflows, works across platforms, and keeps security at the forefront.

Hulu, DreamWorks Animation, Viacom, HBO, Red Bull and BBC are among MediaSilo’s more prominent clients today, all taking advantage of a media-sharing solution that saw more than five million videos viewed using the company’s video sharing platform in the past 12 months.

Pradel, CEO and founder of MediaSilo, spoke with the Media & Entertainment Services Alliance (MESA) about the latest in the world of video file sharing, the mistakes media and entertainment companies make when sharing their content, and the increasing importance of watermarking.  Read more

CDSA Announces New Appointments (CDSA)

February 28, 2016 · Posted in Latest News · Comments Off on CDSA Announces New Appointments (CDSA) 

Chris Johnson Named Worldwide Director of Anti-Piracy and Compliance Programs

LOS ANGELES —  In order to provide expanded services to its customers and to address increasingly sophisticated threats to media & entertainment companies worldwide, the Content Delivery & Security Association (CDSA) has announced the appointment of Chris Johnson as its new Worldwide Director of Anti-Piracy and Compliance Programs. Along with his appointment, the 45-year old non-profit association has hired new team members to serve its key markets in the U.S., Europe and Asia.

The announcements were made by CDSA’s current Worldwide Director of Anti-Piracy and Compliance Programs Peter Wallace who will assume the role of Senior Consultant, Content Protection Services.

Prior to his appointment, Johnson co-authored and project managed the development of the original CDSA Content Protection & Security standard (CPS) and has continued as project lead on the CPS program. A regular speaker at MESA and CDSA conference events in Los Angeles, New York and London, he holds 15 years of content protection experience at managerial level in the television, film and music industries. Read more

HP: Apps, Malware Tops Among Cyber Risks for Businesses (CDSA)

February 28, 2016 · Posted in Latest News · Comments Off on HP: Apps, Malware Tops Among Cyber Risks for Businesses (CDSA) 

By Chris Tribbey

Mobile apps and malware quickly became the top threats for businesses in 2015, according to a new report from Hewlett Packard Enterprise (HPE), and while the sophistication of attacks keeps increasing, organizations are still struggling to keep pace.

That’s according to the “HPE Cyber Risk Report 2016,” which identified the top security threats of last year, and offered suggestions on how companies can tackle those threats this year.

App vulnerabilities, security patching and the monetization of malware were the top targets HPE identified, according to Sue Barsamian, SVP and GM of security products for HPE. And the ever-growing diversity of digital platforms, shifting political agendas, and the ongoing debate between privacy and security are all contributing to the problem as well.

“In 2015, we saw attackers infiltrate networks at an alarming rate, leading to some of the largest data breaches to date, but now is not the time to take the foot off the gas and put the enterprise on lockdown,” Barsamian said. “We must learn from these incidents, understand and monitor the risk environment, and build security into the fabric of the organization to better mitigate known and unknown threats, which will enable companies to fearlessly innovate and accelerate business growth.”

Read more

Report: Business People Most at Risk to Mobile Security Threats (CDSA)

February 8, 2016 · Posted in Latest News · Comments Off on Report: Business People Most at Risk to Mobile Security Threats (CDSA) 

By Chris Tribbey

Nearly 80% of businessmen and 67% of businesswomen every day use mobile apps that pose security risks, beating out Millennials (65%) and every other notable group when it comes to clicking malicious links and downloading infected files, according to a new report.

Looking at the mobile data records of 500,000 mobile users (including Android, iOS and Windows Phone operating systems) during a week-long period, security software company Kaspersky Lab and IP service optimization company Allot Communications found that, overall, one in every 30 mobile browsing transactions presents a security risk, along with one in every seven mobile app sessions.

In short, every time you browse the Internet or use an app on your smartphone, you better be wary.

Read more

M&E Journal: How — and Why — For-Profit Piracy Works (CreativeFuture)

February 1, 2016 · Posted in Latest News · Comments Off on M&E Journal: How — and Why — For-Profit Piracy Works (CreativeFuture) 

By Chris Ortman, VP Communications & Corporate Affairs, CreativeFuture

Piracy is a problem that affects the creative communities: major studios and networks, mini-majors and independents, distributors and exhibitors, book publishers, major and independent record labels, businesses that service the industry (caterers, florists, stylists, travel agents, etc.), as well as producers, directors, actors, writers, musicians, composers, recording artists, songwriters, authors, set builders, and every individual creative professional. Independent films are especially vulnerable to piracy’s impact because their production budgets are smaller. When pirates profit from stolen creative works, creatives lose their fundamental right to be compensated for their work.

So how do pirate sites make money?: Illegal pirate sites make millions of dollars from advertising or by selling monthly “premium” subscriptions that are processed by major credit cards. The statistics are astounding—a recent study looked at a sample of nearly 600 for-profit pirate sites and estimated $227 million in annual advertising revenue, a significant portion coming from major brands.  Read more

Government Task Force Recommends Changes to Copyright Act (CDSA)

February 1, 2016 · Posted in Latest News · Comments Off on Government Task Force Recommends Changes to Copyright Act (CDSA) 

By Chris Tribbey

The U.S. Department of Commerce’s Internet Policy Task Force has released a set of copyright reform proposals, calling for more flexibility for courts when it comes to awarding statutory damages in copyright cases.

The report recommends that the Copyright Act be updated to include a list of factors for courts and juries to consider when determining how much to award in terms of statutory damages, calling for more caution against “excessively high statutory damages.” Currently, juries can award up to $150,000 in statutory damages per infringement.

While the task force isn’t recommending that the $150,000 figure be lowered, it does want juries to avoid excessive damages when it’s an individual file sharer at work, vs. large-scale, file-sharing infringement. The report also recommends that Congress establish a small claims tribunal, to set caps on damages awarded.

“Ensuring that our copyright policy continues to provide incentives for creativity while keeping up with the world’s technology advancements has been a critical priority for the Internet Policy Task Force” said Michelle K. Lee, under secretary for intellectual property and director of the United States Patent and Trademark Office, in a statement. “These new policy recommendations are the culmination of many sessions hearing from stakeholders — from publishers and producers to artists to digital entrepreneurs and consumers — and will help the United States’ creative sectors continue to unleash new works and technologies that spur our competitive economic growth.”

Read more

The Four Biggest Cyber Threats Facing Hollywood (Hewlett Packard Enterprise)

February 1, 2016 · Posted in Latest News · Comments Off on The Four Biggest Cyber Threats Facing Hollywood (Hewlett Packard Enterprise) 

Disney execs may now be sitting on the highest-grossing movie of all time (“Star Wars: The Force Awakens,” if you haven’t heard of it), but pity the folks who had to keep the film from falling into the hands of the dark side before its release. Like all movie, TV, music and video game content, the film was under assault from prying eyes and greedy pockets from the day it was announced.

Miraculously, the film made it to release with no major online leaks nor any significant spoilers — proof that at least someone knows what they’re doing in the world of digital media security these days.

Cyber attacks aren’t going to stop, and judging from recent headlines, they’re getting worse. Media and gaming companies — whose business revolves around heavily hyped mainstream content that everyone’s dying to get their hands on — have become prime targets. But, says Walter O’Brien, executive producer of CBS’s “Scorpion” and the real-world hacker upon whom the show is based, “Like most people in cybersecurity, most studios think it will never happen to them because they’re not a bank.”

What’s being done to stem the tide? Here are four major threats impacting entertainment and media companies —and what the industry is doing about them.

Common Security Mistakes in App Development (Independent Security Evaluators)

February 1, 2016 · Posted in Latest News · Comments Off on Common Security Mistakes in App Development (Independent Security Evaluators) 

When developing iOS applications, there are several ways to secure sensitive data that an application may handle. These measures may or may not be secure when the device is lost or stolen, which could lead to the loss in integrity of the sensitive data. Even when utilizing Apple’s provided security controls (e.g., keychain) for secure storage, data is still at risk for exposure.

iOS applications have their own sandboxed folders, which cannot be accessed by any other application. Although every iOS application has its own sandboxed folder, the data within those folders could be accessible by readily available free applications. While Apple’s security model is a comprehensive one, it relies on the fact that users do not have file system root-level access. Developers must take extra steps to ensure sensitive data is secure from adversaries even when they have root access to the file system.

The Damn Vulnerable iOS Application1 (DVIA) will be used to simulate common mistakes that developers make. This application was developed to provide people with an application to gain or test iOS application reverse engineering skills.

This whitepaper is geared toward those who want to gain knowledge about assessing iOS applications and/or developers who want to know how to develop more security sound applications.

CES Sees Focus on Cyber Security (CDSA)

January 4, 2016 · Posted in Latest News · Comments Off on CES Sees Focus on Cyber Security (CDSA) 

By Chris Tribbey

Between drones, connected cars, 4K Ultra High-Def TVs and virtual reality, there won’t be a shortage of upbeat headlines coming out of this week’s Consumer Electronics Show (CES) in Las Vegas.

But after a year that saw an almost unprecedented number of cyber attacks against both businesses and government agencies, this year’s CES will also see a major focus on the new security risks posed by all this new tech-based connectivity.

“The growth in connected devices creates new opportunities to change and save lives, but also creates new options for bad guys,” said Gary Shapiro, president and CEO of the Consumer Technology Association (CTA). “Cyber security technologies help block, detect and isolate cyber-attacks. Cyber security companies are using CES to launch and demo the next generation of innovation that is going to keep us safe and protected.”

This year’s CES sees the return of the Cyber and Personal Security Marketplace, a specific zone in the Las Vegas Convention Center (LVCC, South Hall 1) dedicated to cyber security technologies. Secure messaging, private Internet access, safe payment apps and more will be on display from exhibitors in the dedicated area.

Read more

Hollywood Reacts to DVD Screener Leaks (CDSA)

December 28, 2015 · Posted in Latest News · Comments Off on Hollywood Reacts to DVD Screener Leaks (CDSA) 

By Chris Tribbey

Leading up to Christmas, Hollywood was already reeling from the online leak of The Hateful Eight and Revenant, both via high-quality DVD screeners and both ahead of the films’ Christmas Day theatrical debut.

Peer-to-peer sharing group Hive-CM8 claimed responsibility for the leaks, promised to release as many as 40 advanced screeners of new theatrical content, and quickly followed through on its threat: via the group, screeners of Joy, Steve Jobs, Bridge of Spies, Creed, Spotlight, Legend, In The Heart of The Sea, The Danish Girl, Concussion and — on Christmas Day — the new James Bond film Spectre, have all been leaked online, all tracked to Hive-CM8, according to Bit Torrent news service TorrentFreak.

“While little is known about Hive-CM8, sources inform TorrentFreak that less than a handful of people are involved,” the site reported after Spectre hit Torrent sites. “A relatively small operation, but one that has managed to ruin Christmas for a billion dollar industry. Through its sources Hive-CM8 got their hands on many screener copies, of which it has published 11 so far, with Spectre being the most recent.” Read more

Microsoft Azure Exec Talks ‘Red,’ ‘Blue’ Cyber Security Teams (CDSA)

December 21, 2015 · Posted in Latest News · Comments Off on Microsoft Azure Exec Talks ‘Red,’ ‘Blue’ Cyber Security Teams (CDSA) 

By Larry Jaffee

Organizations are best served with the mindset that they’ve already been hacked, instead of relying on technologies in place to ward off attacks. That was the message delivered by Joel Sloss, program manager of security, privacy and compliance for Microsoft Azure, at the recent Content Protection Summit (CPS) in Los Angeles.

“If you haven’t been hacked yet, it’s because you don’t know you’ve been hacked,” Sloss said.

Microsoft itself is in “an environment under constant attack,” he said, and the company takes a proactive approach on how it views IT security. For example, Microsoft runs regularly “war games,” in which its own operatives act as hackers, utilizing the same tactics that criminals use in their attacks.

But these are not run-of-the-mill drills. The “red” team attacks live Microsoft sites without giving the defensive “blue team” advance warning, therefore providing a better sense of how well it will fare against real threats aimed to inflict harm.

“They [blue team] don’t know it’s a game; they think it’s a real attack,” Sloss said, noting the major difference between a simulated attack and a real one “is that we get to sit down and talk about it afterward” (this Azure video explains how their red-blue games work). Read more

CDSA Announces 2016 Board of Directors (CDSA)

December 14, 2015 · Posted in Latest News · Comments Off on CDSA Announces 2016 Board of Directors (CDSA) 
Content Security Association Now Represents Major Studios, Independents and Tech Leaders

LOS ANGELES — Celebrating its 45th year, the Content Delivery & Security Association (CDSA) has announced the election of new members of the board of directors, selected to lead the non-profit trade group into its next half-century of industry service.

“Over the past five years CDSA has exclusively focused its efforts on providing content protection and security services to companies throughout the international media supply chain,” said CDSA chairman Richard Atkinson, corporate director of the global piracy conversion team at Adobe Systems. “Our new elections to the Board reflect this emphasis and expand on our activities within the global entertainment, technology and software communities.” Read more

Experts: Production Security a ‘Delicate Balance’ (CDSA)

December 14, 2015 · Posted in Latest News · Comments Off on Experts: Production Security a ‘Delicate Balance’ (CDSA) 

By Chris Tribbey

MARINA DEL REY, Calif. — For a very long time, producers haven’t paid much attention to security on the set, according to John Canning, new media council board member for the Producers Guild of America. It just always seemed like someone else’s problem to deal with.

But recently he’s has seen a major shift in thinking among major producers, a growing awareness of just how important production security — physical and digital — actually.  “They’re realizing, ‘Wait, this is impacting me, it isn’t just something the studio keeps harping about,’” he said, speaking during a panel at the sixth annual Content Protection Summit (CPS). “Now they start seeing it impact their bottom line, start seeing things showing up on YouTube.”

Today, the Producers Guild is putting more emphasis on security education than ever before, helping producers realize that if they don’t respect and understand the best practices in place, they can’t expect the rest of the crew to do so either. Read more

Akamai: DDoS Attacks Rise; M&E Companies Among Top Targets (CDSA)

December 14, 2015 · Posted in Latest News · Comments Off on Akamai: DDoS Attacks Rise; M&E Companies Among Top Targets (CDSA) 

By Chris Tribbey

The third quarter saw a record 1,510 distributed denial of service (DDoS) attacks recorded on Akamai’s routed network, an increase of 180% over the third quarter of 2014 and a 23% increase quarter to quarter, according to the company’s third quarter State of the Internet report.

Especially troubling for media and entertainment companies: the industry was the most frequently targeted by mega DDoS attacks (those measuring 100 Gbps or more) and accounted for 5% of all DDoS attacks. During the quarter, one media and entertainment company was the target of the largest million packets per second (Mpps) DDoS attack ever recorded, at 222 Mpps.

The online gaming sector was heavily targeted during the quarter, accounting for 50% of all DDoS attacks, with software and technology second at 25%. The Internet and telecom sector was hit by 5% of attacks, down from 13% in the second quarter. Retail suffered the vast majority of Web application attacks, accounting for 55%, according to the report. Read more

CPS Panel: Treat Production in the Cloud Carefully (CDSA)

December 7, 2015 · Posted in Latest News · Comments Off on CPS Panel: Treat Production in the Cloud Carefully (CDSA) 

By Chris Tribbey

MARINA DEL REY, Calif. — During a presentation on production in the cloud at the recent Content Protection Summit (CPS), a central analogy quickly emerged: is your cloud a house or a hotel?

A private data center can be locked away pretty tightly, with more control over who has the leys and who comes and goes. A public cloud on the other hand is just that: a public space.

Read more

Next Page »

  • Auditing Programs

CPS_logo_NEW

CLV_logo_NEW

MRSSP_logo_NEW

MRSSP_logo_NEW

  • Connect with Us

  • Register for Updates