Created date

December 13, 2016

Share

There is a widespread misconception that the IoT will raise new threats that can only be met by emerging technologies, but the reality is that the IoT is not really a new problem for the security industry. We have had things connected to the internet for many years now, most relevantly for Verimatrix being the set-top box.

Created date

November 10, 2016

Share

Security is not a feature but rather a process. Security consists of many components and layers. These include robustness attributes of chipsets, device identity and certificates, secure protocols, etc. But one fundamental component is often neglected: secure download of trusted applications and the ability to upgrade them quickly and on demand.

Created date

October 11, 2016

Share

When I presented at the TEE Conference two years ago, I was optimistic over the prospect of harnessing the TEE to protect UHD content in particular, speculating on the challenges and how they would be met. I am gratified to note that our fundamental object of evangelizing the TEE has been achieved, since it has become the defacto standard for the software component of overall video security.

Created date

March 15, 2016

Share

Our VideoMark forensic watermarking toolset has already proved highly successful in tackling illicit redistribution of UHD movie content, and now the Live Profile version is ready to provide the same level of protection for live sporting events.

Created date

January 14, 2016

Share

As we prepare for Convergence India 2016, the show organizers asked me for my perspective on how Verimatrix is contributing to this year’s “Digital India” theme. Excerpts from the Q&A are featured in this post. I will be providing more insight into these themes during my Convergence India keynote session, “Transforming pay TV in India through innovative business models".

Created date

August 25, 2015

Share

I just finished reading an excellent book titled Televisionaries and written by Marc Tayer, an industry trailblazer who previously served as the VP of Global Marketing at Motorola and has three decades of experience in the media and communication technology business.

Created date

October 10, 2014

Share

Created date

September 30, 2014

Share

Ensuring revenue security can be quite a complex undertaking for global pay-TV operators. However, leveraging a variety of hardware security methods – including the use of a Trusted Execution Environment (TEE) – can support the fundamental requirements of any security strategy: durability and renewability.

Created date

September 12, 2014

Share

Earlier this week, we unveiled the profile of VCAS Ultra™, our next-generation Video Content Authority System (VCAS™) architecture.

This is certainly very exciting news for us as a company – it represents the culmination of much hard work and relentless innovation. But we also think it represents a significant development for the pay-TV industry on the whole.

Created date

May 12, 2014

Share

Last month, I had the pleasure of presenting a session on “The Evolution of Security in the Connected World” as part of NAB’s Broadcast Engineering Conference. During the session, I explored current multi-network and multi-device security models, and detailed possible responses to potential piracy.

Pages