Essential Guide: Making Cloud Systems Secure

February 15th 2023 - 09:30 AM
Tony Orme, Editor, The Broadcast Bridge

This Essential Guide discusses the new security challenges presented by IP & cloud infrastructure and the need to move from traditional perimeter based approaches to using encryption, OAUTH 2.0 and Zero Trust methodologies. 

The conversation around security seems to have come out of nowhere and is gathering momentum. And as more broadcasters take advantage of IP, then the issues regarding security are gaining much more scrutiny. 

Security isn’t new to broadcasters as we’ve been protecting high-value media assets and transmissions since the dawn of television. However, the barrier to entry in terms of cost and understanding has been huge meaning that the average criminal needed specialist knowledge, expertise, and experience to be able to acquire broadcast media.

The adoption of IP by broadcasters requires a new approach to security. We can no longer rely on the technical expertise needed to decode video and audio and must learn from other industries such as finance and medical imaging to understand how broadcasters can build highly secure datacenters and networks.

Download this Essential Guide now. It has been written for technologists, broadcast engineers, their managers, and anybody looking to understand the security challenges in their broadcast IP infrastructures.

Supported by

You might also like...

An Introduction To Network Observability

The more complex and intricate IP networks and cloud infrastructures become, the greater the potential for unwelcome dynamics in the system, and the greater the need for rich, reliable, real-time data about performance and error rates.

2024 BEITC Update: ATSC 3.0 Broadcast Positioning Systems

Move over, WWV and GPS. New information about Broadcast Positioning Systems presented at BEITC 2024 provides insight into work on a crucial, common view OTA, highly precision, public time reference that ATSC 3.0 broadcasters can easily provide.

Next-Gen 5G Contribution: Part 2 - MEC & The Disruptive Potential Of 5G

The migration of the core network functionality of 5G to virtualized or cloud-native infrastructure opens up new capabilities like MEC which have the potential to disrupt current approaches to remote production contribution networks.

Designing IP Broadcast Systems: Addressing & Packet Delivery

How layer-3 and layer-2 addresses work together to deliver data link layer packets and frames across networks to improve efficiency and reduce congestion.

The Business Cost Of Poor Streaming Quality

Poor quality streaming loses viewers at an alarming rate especially when we consider the unintended consequences of poor error reporting on streaming players.