Confident your content is safe from pirates? Think again!

Irdeto_Perspective_Content_Safe_from_Pirates

There is no doubt about it, pirates are criminals. Unfortunately they are also entrepreneurs. They know that high quality, compelling content offered at a reasonable price sells! As such all legal content – thematic channels, recent movie releases, and particularly live sport – is a target. Unless investments are protected, content is not safe.

More and more are out there
As you know from my earlier post , we are facing a wave of piracy larger than ever before.

Turning the Internet of Threats into the Internet of Trust

Irdeto_Perspective_Internet_of_Things

Could an innocent device like a STB, webcam or home thermostat be used by hackers to attack you? In the current world of the Internet of Things (IoT), the answer is Yes! Leading to the name Internet of Threats. But operators have the power to change this.

IoT promises connected convenience at consumer’s fingertips. From adjusting your home heating when you land back at the airport, to checking your home security remotely if the alarm goes off while you’re out. Consumers depend on their operator to be the trusted party and remove any privacy or security implications.

Are online video analytics enough on their own?

Irdeto_Perspective_online_video_analytics

Marketers rely on analytics for evidence-based decision making. And analytic tools provide the insight needed into the customer viewing experience and drives continual improvement. But how reliable are those decisions if the insight doesn’t give the full picture?

Online video is exploding
There’s no doubt about it, the popularity of online video continues to grow. As a core offering, it’s right that pay-TV operators want to better understand the trends and operational performance affecting their business and be able to respond more effectively.

Tipping point of trust in mobile payments

Irdeto_Perspective_tipping_point_mobile_payments

Finally mobile payment is starting to take off. Yet, for it to become a true success story, establishing trust is paramount. The question is, is software security the hero or villain of this story?

How safe is it?
Security and fraud prevention concerns are key drivers in the slow uptake of mobile payments. Can someone else use my smart phone to make purchases?
Identity verification and device based authentication are the cornerstones for any mobile payment transaction. Put simply, is it you and are the security assets for the point of sale (POS) secured within the device. This can be achieved using either hardware or software.

Who’s responsible for fighting online piracy?

Irdeto_Perspective_Responsibility_Online_Piracy

As you know from my earlier post, we’re facing a wave of piracy bigger than we’ve ever seen before. OTT piracy – aka content redistribution – is today’s biggest threat. But is it down to the pay-TV operators or content rights holders to take on this fight?

A common enemy
There’s no doubt about it. Online pirates are bad for business. Pay-TV operators are facing potential subscriber churn to cheaper illegal services. For content rights holders this is an emerging threat affecting loss of revenue as these alternative sources are diluting the value of the content.

Help! Mom’s internet TV won’t work on Chrome

Consumer viewpoint thumbnail

Do you ever get phone calls from friends and family who need help with their computer or DVD player? Troubleshooting is often challenging, but over the phone it can get almost surreal; “The Google’s not working… oh, wait, the Google’s back working again” [sic]

Although I am no computer expert, nor even a “digital native”, I am the family’s favorite geek when it comes to technology. Recently, this has …

Tackling the next-generation security challenge with credential management

Irdeto_Perspective_tackling_next_generation_security_credentials

Many aspects of our lives are dependent on credentials such as logins, passwords or pin codes. As technology continues to be more IP driven and the world more connected, how safe are these credentials that we rely on so much?

You are the target
Credit card numbers have limited value – more information is needed to target you. As Bloomberg highlights, attacks on medical records are increasing because the data is richer. Identity theft requires accessing systems which have more information about you.

Don’t get left behind with 4K readiness

Irdeto_Perspective_4K_customer_plans

Over the last couple of months I’ve been surprised by how few pay-TV operators have concrete 4K plans in place. Other issues are their priority. But I wonder will they get left behind as a result?

Adoption will be quicker
Earlier this year, Business Insider forecasted that 4K will roll out much faster than industry analysts predict. This echoes what we see in the adoption rates.

How safe is your STB?

stb_security

Cybercrime is big business. And the impact is far reaching. No organization is immune. Cable and Satellite operators with their large number of STBs could be vulnerable to attack. Can anything be done to minimize the risk?

Changing face of cybercrime
Hackers are no longer teenagers wanting to gain notoriety. Over the years, we’ve witnessed cybercrime change.