Will the real pay-media disruptor please stand up?

Just in time for 2017 predictions about the pay-media industry. Typically, there’s always something about disruptors. But let’s be frank, so far the so-called disruptors haven’t brought the industry to its knees. Isthe industry too resilient or is the real disruptor yet to make an entrance?

What got me thinking
Last Sunday, after a pleading text from my student son I transferred money to his account. It took 26 seconds to reach his account!

Consolidation: what the press release doesn’t tell you

Consolidation within the media industry shows no sign of stopping. It’s happening on both sides: vendors and customers. When it comes to security vendor consolidation why is it important to look beyond the press release?

The beat goes on
Hearing about vendor consolidation or rumored consolidation is common place. It’s part and parcel of our industry.

Looking at the role of CA today and in the future

Pay-TV operators have used CA since the 1990s to encrypt digital content. Over the years, CA has evolved, with Irdeto launching the first software based card-less CA in 2011. But does the CA technology still have a role to play going forward?

Looking back
CA started life in the analogue broadcast world. Its role was to scramble the video signal. With the evolution to digital broadcast, CA transformed to what you can call “true” conditional access with encryption.

Thinking differently about software security: Inside-Out

We live in a very different world today than we did 10-20 years ago. We’ve never been more connected. So, it’s surprising that software security practices remain in the realm of “We’ve always done it this way before”. Can they really expect to solve today’s security problems with an old way of thinking?

Traditional thinking
Traditional thinking typically starts with the premise that honest parties control the computer devices and any cryptographic operations are performed free from interference from would-be attackers. Given this, it’s probably understandable

Mobile has changed everything…except the security mindset?

Statistically every person in the world between 15 to 64 years old has a smartphone or tablet today. In the next 5 years for every baby born 10 smartphones will be sold1. Smartphones have literally changed our lives, from playing, working to everyday living. But what can we learn from app developers, who’ve made mobile devices so powerful?

Learning from app developers
With 102 billion mobile app downloads to date – averaging 22 apps per device2 – it’s clear that software developers know what they are doing.

Fashioning a security solution with big data

A friend of mine once told me that software engineers are fashionistas at heart. Instead of trying to out dress each other they out buzz word each other. Well the latest buzz words you likely to hear on this season’s software engineering runway are Hadoop, Splunk and Deep learning.

Yes indeed these big data buzzwords have been flying around Irdeto for some time. Now you normally think of big data as being used to analyze consumer behavior or to learn that the breading patterns of toads are great predictors of earthquakes. But what has big data got to do with security?

Tipping point of trust in mobile payments

Finally mobile payment is starting to take off. Yet, for it to become a true success story, establishing trust is paramount. The question is, is software security the hero or villain of this story?

How safe is it?
Security and fraud prevention concerns are key drivers in the slow uptake of mobile payments. Can someone else use my smart phone to make purchases?
Identity verification and device based authentication are the cornerstones for any mobile payment transaction.