Essential Guide: Making Cloud Systems Secure
February 15th 2023 - 09:30 AMThis Essential Guide discusses the new security challenges presented by IP & cloud infrastructure and the need to move from traditional perimeter based approaches to using encryption, OAUTH 2.0 and Zero Trust methodologies.
The conversation around security seems to have come out of nowhere and is gathering momentum. And as more broadcasters take advantage of IP, then the issues regarding security are gaining much more scrutiny.
Security isn’t new to broadcasters as we’ve been protecting high-value media assets and transmissions since the dawn of television. However, the barrier to entry in terms of cost and understanding has been huge meaning that the average criminal needed specialist knowledge, expertise, and experience to be able to acquire broadcast media.
The adoption of IP by broadcasters requires a new approach to security. We can no longer rely on the technical expertise needed to decode video and audio and must learn from other industries such as finance and medical imaging to understand how broadcasters can build highly secure datacenters and networks.
Download this Essential Guide now. It has been written for technologists, broadcast engineers, their managers, and anybody looking to understand the security challenges in their broadcast IP infrastructures.
Supported by
You might also like...
IP Security For Broadcasters: Part 1 - Psychology Of Security
As engineers and technologists, it’s easy to become bogged down in the technical solutions that maintain high levels of computer security, but the first port of call in designing any secure system should be to consider the user and t…
Demands On Production With HDR & WCG
The adoption of HDR requires adjustments in workflow that place different requirements on both people and technology, especially when multiple formats are required simultaneously.
If It Ain’t Broke Still Fix It: Part 2 - Security
The old broadcasting adage: ‘if it ain’t broke don’t fix it’ is no longer relevant and potentially highly dangerous, especially when we consider the security implications of not updating software and operating systems.
Standards: Part 21 - The MPEG, AES & Other Containers
Here we discuss how raw essence data needs to be serialized so it can be stored in media container files. We also describe the various media container file formats and their evolution.
NDI For Broadcast: Part 3 – Bridging The Gap
This third and for now, final part of our mini-series exploring NDI and its place in broadcast infrastructure moves on to a trio of tools released with NDI 5.0 which are all aimed at facilitating remote and collaborative workflows; NDI Audio,…