FEED Spring 2024 Web

impacted the media tech industry, and even though it has boosted creativity leading to more content, using public networks (airports, coffee shops, libraries etc) is not particularly secure. Since applications reside on a wide range of hardware and devices, vulnerabilities can be difficult to find and patch. Vulnerable applications can also give attackers a gateway to access data on platforms that were never intended to be accessed, such as other user data and account information. Attackers can also render these devices useless through denial- of-service attacks. As OTT platforms continue growing, so do the risks associated with data breaches, unauthorised access and content piracy. Since OTT service providers rely on public internet to distribute their content to reach as many viewers as possible, the attack surface is wide. Plus, many OTT services are interconnected with other data and applications. For example, lost data for a single

OTT application could include user credentials, payment information, user data, shopping habits and connections to other high-value applications from single sign-on (SSO) data. MIKE MULREADY: The broadcast, streaming and media tech industries are confronting a wide array of security challenges. One of the foremost concerns is content piracy, where unauthorised access and distribution of copyrighted material lead to significant revenue losses and devalue original content. Cyberattacks, including network breaches to steal sensitive data or disrupt services, present a persistent threat. The misuse of legitimate access credentials – through either sharing or theft – gives unauthorised access, while phishing and social engineering tactics deceive individuals into compromising confidential information. API and interface security is another critical concern, as insecure APIs can serve as entry points for cyberattacks.

Intellectual property theft extends beyond content to include trade secrets and proprietary technologies, greatly impacting competitiveness. Emerging threats like deepfakes and synthetic media, generated by AI, pose risks for misinformation and fraud, complicating the landscape further. Addressing these multifaceted security challenges demands complete cybersecurity strategies – encompassing encryption, watermarking, AI-driven solutions and ongoing vigilance to protect against evolving threats. ROBIN BOLDON: We see three prevalent and financially damaging security threats: content leaks, platform design vulnerabilities and cyberattacks. Content leaks and the for-profit redistribution of unlicensed content by pirates can occur from production and post-production workflows, plus final distribution channels. Monitoring various pirate sources for leaked content is crucial

FEED: ARE THERE SOME RECURRING TRENDS WHEN IT COMES TO PROTECTING CONTENT?

• Device blocking: This is a proactive measure crucial in curbing video piracy, serving as a pivotal defence mechanism against use of compromise devices. By maintaining a comprehensive list of authorised devices and employing robust device identification mechanisms, streaming providers can effectively block access to content from unauthorised or compromised devices. ROBIN BOLDON: One trend is the need to ensure baseline security is sound. We’re aware of cases where basic entitlement security – the integration of DRM with content delivery infrastructure (CDN) – hasn’t been implemented properly, making it easy to access premium content. Other trends we’re seeing include: • The circumvention of geo-blocking using VPNs and proxy servers • The theft and unauthorised sharing of session tokens from legitimate viewers • The extraction of content keys from licensees by taking advantage of a device’s security vulnerabilities • The sharing of user credentials – either casually within family and friend groups or on an industrial scale for-profit and commercial gain. CRYSTAL PHAM: While ransomware and phishing attacks are not new, they occur more frequently, being more sophisticated and impactful than ever before.

MIKE MULREADY: Here are some of the key trends are shaping the strategies and technologies being deployed: • Watermarking: Unique marks are invisibly embedded into video content before broadcast, containing identifying information. Specialised systems scan live streams for these watermarks, detecting unauthorised distribution. • Site blocking: A technique used to restrict access to websites or online platforms known to host or facilitate the distribution of copyrighted content illegally. The process typically involves legal action against internet service providers (ISPs) or other intermediaries to compel them to block specific websites at the network level. • App protection: Protecting the application plays a pivotal role in fortifying video service platforms’ security, serving as a cornerstone in the defence against video piracy in general. This approach involves a range of measures to prevent reverse engineering, unauthorised tampering and malicious clones. Techniques such as code obfuscation, anti-tampering and integrity checks bolster the resilience of applications against threats.

feedmagazine.tv

Powered by