Skip to content

The Verimatrix Cybersecurity Blog

Browse our blog for insights and analysis about all things related to cyber security in the connected world. Find industry-related articles, news, and advice from our security specialists, and learn more about how to best safeguard your content and applications.

OTT Under Fire: Putting the Kibosh on Piracy

Video consumption has evolved from the familiar pay TV bundles of channels delivered by cable or satellite to today’s multi-sourced streaming content delivered digitally across many devices — thanks to advances in internet/cloud and mobile technologies. These advances, combined with the OTT revolution and COVID-19 disruption, have accelerated the pace of change and corresponding threats. Piracy, for example, has grown from local, isolated annoyances to technically savvy fraud executed at scale, capable of disrupting multi-million dollar revenue streams with ease. Serious stuff.

Tap to Phone Rules and Regulations

Driven largely by Gen Z players and an audience made up of 16-24 year olds, professionals in adjacent markets (including broadcasting, software development, and payment processors) would be wise to take a deep dive into the bourgeoning world of esports to gain a better understanding of their intertwined futures.

At the Edge of Esports: Team 7AM Speaks

Driven largely by Gen Z players and an audience made up of 16-24 year olds, professionals in adjacent markets (including broadcasting, software development, and payment processors) would be wise to take a deep dive into the bourgeoning world of esports to gain a better understanding of their intertwined futures.

Pro soccer player trying to block goal

3 Techniques to Strike Out Piracy in Live Sports

Piracy has become a major source of revenue loss, especially during the past year when in-person spectatorship was cancelled. The bright side? Powerful security techniques can prevent and deter piracy at all stages of the workflow.

Abstract image of a download

Insights on BitTorrent Piracy

During the first half of March, Verimatrix used our own client to scrape BitTorrent’s mainline DHT protocol and gain first-hand, localized information about piracy on the world’s biggest distributed network. Here’s what we found.

Apple phone, tablet and laptop displaying app icons

iOS, Bitcode and App Security

Six years ago, Apple added support for Bitcode with Xcode 7. Still, after all this time, there are many misconceptions about what it means for developers and their iOS apps – especially when it comes to security.

Server room with third party technology

Is Your Third-Party and Legacy Software Vulnerable?

The headlines about the recent SolarWinds data breach have brought three security risks center-stage: end of life software, third-party vulnerabilities and software supply chain risk. The attack has left almost every company dependent on third-party software wondering: How can we avoid something like this?

Anti-Piracy