Verimatrix and Inside Secure have merged. Learn more here. Go to Verimatrix website.

Embedded Security Step by Step

Embedded Security Step by Step

So, you’ve got your great idea on how to revolutionize the market! Wait, before you start, have you addressed security?


Let’s address security step-by-step.

Jun 26, 2018
GDPR cover image

White paper - GDPR and PSD2: Are your Apps ready?

Two major new regulations are driving massive changes to how organisations manage their customers’ data. The first of these new regulations is the General Data Protection Regulation (GDPR). This affects all organisations that process or store personal data of EU citizens. The second regulation is 2nd Payment Services Directive (PSD2). This focuses on opening up banking services to non-banks and securing online payments with Strong Customer Authentication.

Jun 12, 2018
How to keep Key Provisioning cost-effective and enable advanced security

How to keep Key Provisioning cost-effective and enable advanced security

In November of 1999, DIRECTV made it a priority to create an in-house security team that would take ownership of broadcast and content delivery security. SypherMedia International (SMI) was formed by members of the DIRECTV Engineering and Conditional Access Group in August of 2003. Before SMI was created, the now SMI team along with fellow DIRECTV members were responsible for re-engineering the security approach of the Pay TV broadcast. This team eliminated piracy at DIRECTV and it has remained secure for more than 15 years.

Jun 6, 2018
Interview with Yospace CTO, David Springall: Protecting Digital Video Ad Revenues

Interview with Yospace CTO, David Springall: Protecting Digital Video Ad Revenues

Last month, Inside Secure and Yospace announced their combined solution to prevent or bypass ad blocking. This solution addresses the estimated $75 billion that publishers alone are expected to lose by 2020 from loss of ad revenue, according to research published by Ovum.

May 28, 2018

Chameleons, the art of deception, and keeping your design away from predators

Out in the wilderness, it is a known instinct that at times the key to survival is to stay invisible. Chameleons are just one of many examples that have mastered the art of camouflage as an important tool for survival, protecting themselves against the many dangers that might bring an end to their life if they are spotted and targeted.


In a major leap, transfer this thought into modern chip design – where new, innovative concepts are created by bright designers who find themselves in a different struggle to survive against hackers who dedicate their passion and sophistication to steal data and even the design itself.

In a nearly Darwinian survival of the fittest, if your design can’t be protected from such hackers, it’s dead! You must not only make sure that your data is kept safe while stationary, in transit or in process, but you must protect your very design as well, avoiding third parties from performing unauthorized copies and use of your design.


An effective way to do this is to apply the concept of camouflage to impair the ability of predators to understand your design. If a wild wolf would look at a rabbit and see an elephant, he would surely not attempt to hunt it, as his odds would be surely against success.


In this paper we will show how a bit of illusion can be used to avoid unauthorized copies, and if they do happen, how to make sure that the end result of the copy is so badly damaged that it becomes useless.

May 14, 2018
Cloud watermarking to protect premium entertainment

Cloud watermarking to protect premium entertainment

Watermarking may be in your future as the entertainment industry trends to Ultra High Definition (UHD) content and the early release of Video On Demand movie titles just a few short weeks after their theatrical run. The watermarking of such premium video content is a new Hollywood studio requirement to prevent piracy. Following is a general explanation of the process from Inside Secure’s recent white paper “CLOUD STRATEGIES FOR THE DIGITAL THREATSCAPE”.

May 7, 2018