FEED Issue 08

32 ROUND TABLE Content Security

UFOM: What are some of the best methods and safeguards we can use to prevent our own employees and contractors (who could be government spies) from stealing our content internally, directly from our servers and archives? ABDUL HAKIM, DPP: In addition to having role-based access to systems, there are other ways of keeping rogue employees from stealing data. USB ports are quite pervasive on technology devices, but by and large, they can be disabled. By disabling USB ports by default, it prevents someone from just walking in and removing content that way. The same with CD and DVD drives. Also employees can fall victim to phishing attacks and cyber attacks. The weakest part of the chain is the human factor. Having proper training around phishing and other scams would also go a long way to increasing security. NEIL SHARPE, FRIEND MTS: Again, content can be protected from internal security breaches by the use of physical security, such as restricted access, as well as encrypting the content at rest.

during live events to see how much of an issue tracking live piracy is. With this being the case, there are now pirate-hunting agencies and technology providers who are specialists in monitoring streams and illegal feeds. NEIL SHARPE, FRIEND MTS: The days of using large numbers of people for monitoring the internet are disappearing fast; the reality is that people are just not fast enough and scalable enough. Instead, streaming piracy is being monitored globally by highly automated, cloud-based systems which can identify thousands of streams of illegal content in just seconds. By using fingerprint-based content recognition, a very high level of content matching accuracy can be achieved without manual intervention. This type of global monitoring is suitable for tackling all types of streaming piracy, including illicit streaming devices, Kodi add-ons, mobile apps, websites and social media. Another key dimension to monitoring is tight integration with the content protection systems of social media companies, like Facebook and YouTube, which have their own sophisticated rights management technology.

EMPLOYEES CAN FALL VICTIM TO PHISHING ATTACKS AND CYBER ATTACKS. THE WEAKEST PART OF THE CHAIN IS THE HUMAN FACTOR

feedzine feed.zine feedmagazine.tv

Powered by