As a cybersecurity professional and a hobbyist painter, I recently revisited one of my past works, ‘Cyberattack’, and started to think about IoT security and the power of visuals a bit differently…
Like many famous 4-letter words, CPIX conveys surprise, shock even, but not in a bad way. It stands for Content Protection Information Exchange, a rather bland term for a standard that brings very exciting changes for the media industry. Driven by the DASH Industry Forum, CPIX is designed to create operational efficiencies and slash the cost and launch time for your OTT services. Suppliers of video solutions such as Irdeto and AWS Elemental have already embraced CPIX and are at the forefront of its adoption.
The UK’s BT recently revealed plans to become a “super aggregator” of content services, adding Amazon Prime Video to its platform alongside Netflix and Sky’s Now TV. It may help to offset OTT competition, but will consumers pay a premium for the convenience of “one-stop” content shopping?
Are you ready for the next big thing in cryptography? Actually, it’s a trick question. Ask 5 different people what the “next big thing” will be and you’ll get at least 5 different answers. Whatever lies ahead, the real question is, are you ready for change? Read more about Cryptographic agility, or cryptoagility…
Many Pay TV operators rely on visual marks or “HashCodes” to fingerprint their content so they can trace piracy leaks to the source. But Irdeto investigations have found tools that help pirates remove these marks openly on sale for less than $2,000. So, what’s the alternative?
Irdeto’s global gaming survey confirmed what we’ve always suspected: cheaters ruin gaming for real gamers. But do the results also indicate that time is running out for publishers to get a grip before cheating becomes the norm throughout the world, with catastrophic implications for both publishers and gamers alike?
In the latest Cloakware® Cate video Catherine shows us how commonly available tools like debuggers can be used, with live data, by a hacker to effectively subvert an application. This simple demonstration captures the essentials […]