Irdeto Insights Blog

Insights and analysis for the media industry and beyond

  • Mental Health and Wellbeing at Irdeto

    Mental Health and Wellbeing at Irdeto

    Mental health and physical wellbeing are often overlooked when it comes to ticking off tasks from our to-do list. We’ve dedicated the whole of October to providing our employees support and...

    Read Article
  • Subscribe now
  • Ransomware attacks are turning human errors into tragedies

    Ransomware attacks are turning human errors into tragedies

    Ransomware is wreaking havoc on hospitals, turning human errors into tragedies. See what you can do to stay safe. The post Ransomware attacks are turning human errors into tragedies appeared first...

    Read Article
  • Virtually speaking, events don’t have to be boring

    Virtually speaking, events don’t have to be boring

    Three presentations across two countries in one day. Life as a presenter in these "new normal" times is a totally different experience in a COVID-19 world. Learn more. The post Virtually speaking,...

    Read Article
  • Are Mobile Device Management Systems giving you a false sense of security?

    Are Mobile Device Management Systems giving you a false sense of security?

    Recently, I had the pleasure of joining my colleagues Will Hickie and Andrew Hoyt with Security Boulevard for a webinar on Automating App Security with AI: How to Secure a Million Lines of Code in...

    Read Article
  • Think the hardware in your car is secure? You might be surprised at our findings…

    Think the hardware in your car is secure? You might be surprised at our findings…

    One of the biggest hurdles in securing hardware is the cost. Understandably, this could prevent smaller device manufactures in securing their hardware, but why would this be an issue for the...

    Read Article
  • Innovation at Irdeto

    Innovation at Irdeto

    Innovation, what does that word really mean? The word is thrown around loosely these days when coming to describe a company, product, or thing, checking off a key term from the buzzwords list....

    Read Article
  • An aquarium of sharks? A cybercriminal sees an opportunity!

    An aquarium of sharks? A cybercriminal sees an opportunity!

    Sharks are dangerous and distracting. While you were looking at them, cybercriminals just stole millions from a casino. You never know how people can get access to your network. The post An...

    Read Article
  • How to bridge the gap in the shortage of cybersecurity professionals

    How to bridge the gap in the shortage of cybersecurity professionals

    One of the major issues in the cybersecurity industry is the shortage of cybersecurity professionals. A 2019 study found that there was a global deficit of more than four million cybersecurity...

    Read Article
  • Anti-Tamper: keeping revenue and games on PC – and console – safe!

    Anti-Tamper: keeping revenue and games on PC – and console – safe!

    With Denuvo’s Anti-Tamper solution successfully protecting games for longer and longer periods of time, people want to know – what exactly is the main purpose of Anti-Tamper, how it helps...

    Read Article
  • Extending telematics into your construction equipment rental customer journey

    Extending telematics into your construction equipment rental customer journey

    Welcome to the 2nd blog of our 4 part series focusing on how 2020 Was The Tipping Point for Equipment Rental Companies to focus on the Customer Journey.   In this blog, we discuss how telematics...

    Read Article
  • Think secure hardware is everywhere? Think again! (The results might shock you!)

    Think secure hardware is everywhere? Think again! (The results might shock you!)

    Is your device protected by secure hardware? The answer might surprise you! In this blog, we take a deeper look into what secure hardware is, how commonplace it is in devices, why some...

    Read Article
  • 2020 Was The Tipping Point for the Equipment Rental Customer Journey

    2020 Was The Tipping Point for the Equipment Rental Customer Journey

    Often it takes a major event or change to force radical change.  In just a couple of months, we can clearly see how the impact of COVID is transforming many industries around the world including...

    Read Article
  • What is a trustworthy device? How to ensure they are trustworthy and why it’s important?

    What is a trustworthy device? How to ensure they are trustworthy and why it’s important?

    There are stringent criteria medical devices must meet to be classed as trustworthy, alongside the software within them - but what does that consist of? Learn more about the importance of...

    Read Article
  • Back to school…maybe.

    Back to school…maybe.

    With the uncertainty surrounding of children going back to school or continuing in-home learning, it is timely to talk about managing kids time on screens. Although no two families' approach on...

    Read Article
  • What’s the root of Android application security?

    What’s the root of Android application security?

    Right now, Android smartphones are dominating the market, so it stands to reason that Android apps and devices are a prime target for cybercriminals. Rooting an Android device makes it even more...

    Read Article
  • Think you know which apps are connecting to your car? Think again!

    Think you know which apps are connecting to your car? Think again!

    As major car brands include mobile apps in vehicles, it’s important to plan the security of these apps carefully. From apps that users install on their smart phones to unlock or start their car,...

    Read Article
  • Keeping the fight fair – busting myths around Denuvo Anti-Cheat

    Keeping the fight fair – busting myths around Denuvo Anti-Cheat

    If you have ever played a competitive PC game, than you probably have played against a cheater at one point or another. Cheating in multiplayer video games has become one of the largest issues...

    Read Article
  • Telemedicine mobile app data security – why it’s essential in today’s connected world

    Telemedicine mobile app data security – why it’s essential in today’s connected world

    Throughout our Telehealth and Telemedicine blog series, we looked at the differences between connected health technologies, types of connected medical devices, the basics of data security and...

    Read Article
  • Jailbreaking is killing your app security

    Jailbreaking is killing your app security

    With the increase in use of mobile apps, the risks of being attacked also goes up. One of the most common threats against iOS apps is Jailbreaking. In this blog, we look at the impact of a device...

    Read Article
  • Working from Home: Desk Diaries of Irdeto

    Working from Home: Desk Diaries of Irdeto

    The adaptation to our working lives has been experienced differently by everyone. The key to the success of supporting people has been to take a more individual approach to situations, recognizing...

    Read Article
  • loading
    Loading More...