Two major new regulations are driving massive changes to how organisations manage their customers’ data. The first of these new regulations is the General Data Protection Regulation (GDPR). This affects all organisations that process or store personal data of EU citizens. The second regulation is 2nd Payment Services Directive (PSD2). This focuses on opening up banking services to non-banks and securing online payments with Strong Customer Authentication.
In November of 1999, DIRECTV made it a priority to create an in-house security team that would take ownership of broadcast and content delivery security. SypherMedia International (SMI) was formed by members of the DIRECTV Engineering and Conditional Access Group in August of 2003. Before SMI was created, the now SMI team along with fellow DIRECTV members were responsible for re-engineering the security approach of the Pay TV broadcast. This team eliminated piracy at DIRECTV and it has remained secure for more than 15 years.
Last month, Inside Secure and Yospace announced their combined solution to prevent or bypass ad blocking. This solution addresses the estimated $75 billion that publishers alone are expected to lose by 2020 from loss of ad revenue, according to research published by Ovum.
Out in the wilderness, it is a known instinct that at times the key to survival is to stay invisible. Chameleons are just one of many examples that have mastered the art of camouflage as an important tool for survival, protecting themselves against the many dangers that might bring an end to their life if they are spotted and targeted.
In a major leap, transfer this thought into modern chip design – where new, innovative concepts are created by bright designers who find themselves in a different struggle to survive against hackers who dedicate their passion and sophistication to steal data and even the design itself.
In a nearly Darwinian survival of the fittest, if your design can’t be protected from such hackers, it’s dead! You must not only make sure that your data is kept safe while stationary, in transit or in process, but you must protect your very design as well, avoiding third parties from performing unauthorized copies and use of your design.
An effective way to do this is to apply the concept of camouflage to impair the ability of predators to understand your design. If a wild wolf would look at a rabbit and see an elephant, he would surely not attempt to hunt it, as his odds would be surely against success.
In this paper we will show how a bit of illusion can be used to avoid unauthorized copies, and if they do happen, how to make sure that the end result of the copy is so badly damaged that it becomes useless.
Watermarking may be in your future as the entertainment industry trends to Ultra High Definition (UHD) content and the early release of Video On Demand movie titles just a few short weeks after their theatrical run. The watermarking of such premium video content is a new Hollywood studio requirement to prevent piracy. Following is a general explanation of the process from Inside Secure’s recent white paper “CLOUD STRATEGIES FOR THE DIGITAL THREATSCAPE”.
“I don’t bank on my phone” cries out our VP for Finance, “it’s not secure!” We must be at another industry event then – it’s a statement he regularly makes.
We’ve always believed that Mobile Banking was a wild west when it comes to security; but we wanted to test that belief with some real data. To better understand the current state of security within the mobile bank industry, UL and Inside Secure undertook joint research to give a snapshot of the industry today.
Applications were selected by a criteria designed to give an even split across geographies, and between challenger and established banks. These applications were then given to the security labs within UL and Inside Secure. The labs used automated tools and expert static analysis to score the applications.