For the average consumer, hopping online to shop is as commonplace as physically going to the mall. No one thinks for a moment about how relatively unsafe it is to conduct business on the web. But in spite of our years’ long dependence on the web for commerce, it’s still astonishingly easy for cybercriminals to hack web-based transactions.
The reason? Web browsers. The fundamental insecurity of web browsers is arguably the weakest link in cyber security today.
Just in time for 2017 predictions about the pay-media industry. Typically, there’s always something about disruptors. But let’s be frank, so far the so-called disruptors haven’t brought the industry to its knees. Isthe industry too resilient or is the real disruptor yet to make an entrance?
What got me thinking
Last Sunday, after a pleading text from my student son I transferred money to his account. It took 26 seconds to reach his account!
Consolidation within the media industry shows no sign of stopping. It’s happening on both sides: vendors and customers. When it comes to security vendor consolidation why is it important to look beyond the press release?
The beat goes on
Hearing about vendor consolidation or rumored consolidation is common place. It’s part and parcel of our industry.
Pay-TV operators have used CA since the 1990s to encrypt digital content. Over the years, CA has evolved, with Irdeto launching the first software based card-less CA in 2011. But does the CA technology still have a role to play going forward?
CA started life in the analogue broadcast world. Its role was to scramble the video signal. With the evolution to digital broadcast, CA transformed to what you can call “true” conditional access with encryption.
We live in a very different world today than we did 10-20 years ago. We’ve never been more connected. So, it’s surprising that software security practices remain in the realm of “We’ve always done it this way before”. Can they really expect to solve today’s security problems with an old way of thinking?
Traditional thinking typically starts with the premise that honest parties control the computer devices and any cryptographic operations are performed free from interference from would-be attackers. Given this, it’s probably understandable
Statistically every person in the world between 15 to 64 years old has a smartphone or tablet today. In the next 5 years for every baby born 10 smartphones will be sold1. Smartphones have literally changed our lives, from playing, working to everyday living. But what can we learn from app developers, who’ve made mobile devices so powerful?
Learning from app developers
With 102 billion mobile app downloads to date – averaging 22 apps per device2 – it’s clear that software developers know what they are doing.
A friend of mine once told me that software engineers are fashionistas at heart. Instead of trying to out dress each other they out buzz word each other. Well the latest buzz words you likely to hear on this season’s software engineering runway are Hadoop, Splunk and Deep learning.
Yes indeed these big data buzzwords have been flying around Irdeto for some time. Now you normally think of big data as being used to analyze consumer behavior or to learn that the breading patterns of toads are great predictors of earthquakes. But what has big data got to do with security?
Finally mobile payment is starting to take off. Yet, for it to become a true success story, establishing trust is paramount. The question is, is software security the hero or villain of this story?
How safe is it?
Security and fraud prevention concerns are key drivers in the slow uptake of mobile payments. Can someone else use my smart phone to make purchases?
Identity verification and device based authentication are the cornerstones for any mobile payment transaction.