<h1>Mark Mulready</h1>

Mark Mulready

Mark leads the strategic direction, global delivery and management of Cybersecurity Services for sports rights owners, broadcasters/operators, games publishers and other verticals. In addition to managing a global team of analysts, investigators and product management experts, Mark oversees the marketing activities for the Irdeto Cybersecurity Services team. Mark was previously the Fraud & Operational Security Manager at Foxtel and also served 16 years in New South Wales Police Service including special assignments in the Drug Enforcement Agency, the National Crime Authority and 3 years as a Prosecutor. Mark holds a Bachelor of Arts and Bachelor of Laws from the University of Wollongong and was admitted as a Solicitor to the Supreme Court of New South Wales in 2004. He is currently Vice President for the leading pan European industry association – AAPA. (http://www.aapa.eu/)
Site blocking must continue to evolve to remain relevant

Site blocking must continue to evolve to remain relevant

Pew Research’s recent study , found that 61% of young adults (18-29) using streaming services as their primary way to watch TV. Given that statistic you can see why site blocking is an important tool in the anti-piracy toolkit. But like the online pirates, it aims to block, it’s critical that site blocking also adapts and evolves.

Is 5G the superhighway for cybercrime?

Is 5G the superhighway for cybercrime?

We live in an always connected world. So much so that in The Netherlands they’ve put the red ‘don’t walk’ light on the ground as people are so engrossed looking down at their mobile device. If you ask how wireless connectivity can be improved: it’s faster download, quicker response and more reliable connection. According to its promise 5G will deliver all that and more! Great news for consumers. But will it be the cybercriminals who are real winners?

Buyer Beware! Are you sure it’s not an illicit streaming device?

Buyer Beware! Are you sure it’s not an illicit streaming device?

Black Friday and Cyber Monday were the peak shopping days ahead of the festive holidays. Bargains galore for consumers. A bonanza for online retailers as well as pirates! With the increased professionalism of pirates, some consumers may not realize they’ve bought an illicit streaming device (ISD).

Legal but modified
Over the years we’ve seen that the most popular devices exploited by pirates are

The A-E of eSports

The A-E of eSports

For some, the steady growth of eSports is no surprise. For others, they’re just starting to hear about it. With phrases like: “is eSports the future?”; “eSports industry is booming”, it’s worth looking at why there’s so much hype surrounding it.
Put simply, eSports is competitive or professional gaming. Players battle it out to go up the rankings and win prize money. And that’s big business?

A game changing watermark for live sports

A game changing watermark for live sports

Watermarking is an essential part of any anti-piracy program. More now than ever, as pirates have started to remove the broadcaster’s logo from the stream. But with a unique robust watermark, you’re able to identify the source of leaked content, even when the logo is obfuscated. What’s more, there’s a different flavor of watermarking depending on your needs. And now there’s a new revolutionary watermark available.

The fight isn’t over…

The fight isn’t over…

As we have seen countless times in the past, consumer demand for live sports is at an all-time high. This content makes it both a key differentiator for pay TV operators and a cornerstone for pirates. These illegal service providers offer thousands of sites providing illegal live sports content attracting millions of viewers. In addition, the eagerness of consumers to watch live sports content means that they not only require, but expect an optimal viewing experience.

Everyone loves public WiFi – particularly hackers!

Everyone loves public WiFi – particularly hackers!

Why should hackers rely on finding a zero-day or unpatched vulnerability? The most common way they break into accounts or networks is by stealing credentials. What’s more they’re easy to obtain.

How are credentials stolen?
Given our addiction to being ‘always connected’, it’s no surprise that WiFi based attacks are a fertile source of stolen credentials.