Media technology employs numerous legacy clear text protocols that may present a little noticed attack surface. How can security professionals at media companies and vendors identify and neutralize the dangers? Note: All CBR Roundtables wrap up with a period during which attendees may ask speakers and CBR Advisory Board Members questions about any security topic.
The IP standard for media and entertainment companies continues to evolve and with that, security protocols are being written. What’s the latest on these important protocols? Roundtable Leaders TBA Note: All CBR Roundtables wrap up with a period during which attendees may ask speakers and CBR Advisory Board Members questions about any security topic.
Broadcast technology can introduce constraints to the environment that can be challenging to vulnerability management. As a result an organization may end up with a quite a pile of software vulnerabilities. It would be interesting to discuss our group’s experience with this topic and also discuss how everyone is dealing with this in terms of […]
NextGen TV turns TV signals into internet streams. This CBR Roundtable will offer a thorough update on how to secure operations to protect broadcasters and consumers. Note: New to media & entertainment industry security? Working on a challenging project? Each CBR Roundtable ends with a conversation during which you may ask speakers or CBR Advisory […]
How are media companies securing hardware that will attach to the supply chains they are planning and building? How are they working with broadcast technology vendors to secure devices and infrastructure? Can the industry define certifications that would identify safe devices for broadcasters.
Media buying agencies and station groups have been refining the performance-based campaigns, designed to deliver better value to national advertisers investing in local. How are these important campaign strategies evolving in 2021? Are media buyers and sellers resolving issues, including in audience measurement, that have complicated execution? How well is technology keeping up with the […]
Arvato Systems is now a member of the Microsoft Intelligent Security Association (MISA). MISA is a group of independent software vendors and managed security service providers that integrate with and provide managed services for Microsoft products to better defend against a world of increasing threads. MISA members are top experts from across the cyber security […]
Cobalt Iron Inc., a provider of SaaS-based enterprise data protection, today announced Cobalt Iron Compass, the new name for its flagship SaaS-based enterprise data protection platform. The company says the new name signifies “the immediate insights and guidance the company delivers to its customers. With the renaming, Cobalt Iron kicks off a new phase of […]
Experts spell out three actions to assess a station’s cyber security risks and offer eight recommendations for performing basic risk management and “cyber security hygiene.”
Cyber breaches come with their own financial and operational considerations. A cyber-attack can mean significant and costly interruptions to business. Here’s a multi-pronged strategy for developing an incident response plan in the increasingly likely event your station suffers a data breach/hack.
While politically motivated hacks such as the ones that may have disrupted France’sTV5Monde and WBOC Salisbury, Md., are scary, they aren’t likely to be typical. Stations and networks are more likely to be hit by garden variety malware and malicious code intrusions because where there is IP, there is vulnerability. An area of particular security concern to broadcasters is the nation’s Emergency Alert System, which is increasingly dependent on networked and IP-based services.