A recent survey of 8,000 Europeans found quality broadband and Wi-Fi in our homes is now more valuable to consumers than sex, holidays, their favorite TV channels or chocolate.
IBC 2019 may go down as one in which live IP video came of age. However, with the rise of live and cutting of latency, this does not make any difference to the security requirements as premium OTT content attracts premium pirates.
Our team is back from Las Vegas where Black Hat USA 2019 was held two weeks ago. The main themes this year included IoT, application security, and the role of humans in security and privacy. […]
With the internet of things (IOT) adoption wider than ever before, companies are constantly developing new devices for our increasingly connected environment. Now is the time to offer more than content to your subscribers! Long […]
It was the winter Olympics that got me thinking. What does it take to be a leader? What are the traits? Although leaders are usually individuals – could those human attributes be translated onto a company?
What makes a leader?
Deloitte identified “The six signature traits of inclusive leadership ”
Android TV is an open environment that could make operators love it, or hate it. There are many reasons for loving it. But there is only one main reason for potentially hating it… the security risk associated with it being open.
Threats are a reality in any environment.
Here are some key take-aways from IBC 2017.
8K approaches normalization
The security of 4K UHD content is currently high on the agenda of content owners everywhere and 8K is already coming into view on the horizon. After more than a decade of development and regular appearances in IBC’s Future Zone, NHK is approaching the finishing line with its 8K broadcasting system.
The media sector is now a top target for cyber criminals and combating these threats is a major focus at IBC. At midday today, the Conference takes aim at the problem, with a sold-out invite-only C-Tech Forum event which places security firmly at the top of executive agendas.
Perhaps the chief take-away is that the threat from piracy is multi-faceted…
The recent ransomware attacks have focused lots of minds on cyber security, however many of the solutions being proposed are little more than sticking plasters to the larger underlying issue – namely systems are not secure by default. The ‘trend’ in software has been to launch it, then fix it. This is a very attractive proposition for businesses, as it lets them discover the ideas that work and don’t work, and then iteratively improve them. Most of the gadgets we use in our lives today would not exist without this mentality. However, the dark side of this approach is that almost all software is not secure. The evidence shows that pretty much every system deployed has security flaws. The only question is who finds the flaws first – bad people or good people.
We read continually about new buffer overflows in tools that allow ‘bad guys’ to take over various systems. This week the unfortunate program was Avast AV. The bit that always surprises me is these issues are still occurring in code written relatively recently, we’ve known how to fix all these issues for many years, yet people keep writing code that has these defects. I’d argue that the main cause of this is premature optimization and ignorance.