The Association of National Advertisers suffered a phishing attack last year that may have resulted in the theft of employee data, including names and Social Security numbers.
Just over a year after publication of SMPTE’s 2110 suite of standards for handling professional media over managed IP networks, the TV industry’s focus has switched from how to transport the data to refining the technology supporting the standard.
Signiant’s Megan Cater: Cybersecurity experts have long been warning of FTP’s potential threat to network security, intellectual property and privacy. Most major media enterprises have banned FTP, requiring that all partners use secure accelerated file transfer solutions. Smaller operations should follow their lead.
Peter Van Peenen, technology consultant to Pearl TV, will update broadcasters on the latest ATSC 3.0 security protocols at TVNewsCheck’s Cybersecurity for Broadcasters Retreat in February.
The executive director of the Institute for Critical Infrastructure Technology will talk about emerging cybersecurity threats; communicating with the C-suite about investing in security; and the latest technologies being used and developed to thwart cyber crime at TVNewsCheck’s second annual Cybersecurity for Broadcasters Retreat in February.
Sali Osman, a cybersecurity and risk strategy adviser, will lead a two-hour interactive exercise to train security and IT leaders in how to respond to a cybersecurity attack. The event will kick off the TVNewsCheck’s 2019 Cybersecurity for Broadcasters Retreat.
There are two types of companies: Those that know they’ve been hacked, and those that don’t know that they’ve been hacked.
The June 20-21 event, designed to address the specific needs of the broadcasting industry, will open with a Cybersecurity Tour of CNN, led by Pete Chronis, SVP and chief information and security officer at Turner.
Holding companies hostage through ransomware is a thriving business. Three big assumptions about the practice that can prove fatal are detailed here. Truly, the only assumption companies should make concerning ransomware and other threats to cybersecurity is that the risks today are already far greater than they were yesterday.
The threat landscape has changed so dramatically, so fast, that it has outpaced previously sound security practices. The problem is twofold. One part of the problem is insoluble; but the other, businesses can remedy — and have no existential choice but to do so.