Category Archives: Content Security

Large quantities of data being served to distributed websites means a large number of ‘weak points’ where information could be intercepted. Content security products and services not only ensure that the content is delivered securely to a destination, but that that it’s storage is safe from unauthorised access.

Research confirms that Facebook, Twitter and Google are spying on users

big brother

big brother (Photo credit: Vince_Lamb)

Social networks: can robots violate user privacy?

ECM Plus +++ Recent news in the international media has revealed numerous Internet privacy concerns that definitely deserve attention and further investigation, which is why Geneva-based High-Tech Bridge  decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed abuse – the privacy of their users.

According to High-Tech Bridge, the experiment and its results can be reproduced by anyone, as we tried to be as neutral and objective as possible. Continue reading

Leave a comment

Filed under Analysis, Analytics & Metrics, Business Risk, Compliance, Content Curation, Content Governance, Content Management, Content management system (CMS), Content Protection, Content Security, Corporate Civic Responsibility (CCR), Corporate Governance, Customer Relations Management (CRM), Data mining, Data privacy, Data protection, Data storage, Digital asset management, Enterprise Content Management, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Information security, Intellectual Property (IP), Intelligent Search, Legal, Policy Management, Regulatory Compliance, Reporting, Risk Analysis, Risk Assessment, Risk Management, Security Content Management (SCM), Social Content Management, Trusted Cloud, UGC - User-generated content, WCM

Mobile Content Revenues To Hit USD65 billion by 2016 – report

English: A variety of laptops, smartphones, ta...

A variety of laptops, smartphones, tablets and ebook readers arranged. (Photo credit: Wikipedia)

Juniper Research says tablet purchases, direct carrier billing implementation to fuel growth

By ECM Plus staff

ECM Plus +++ Annual revenue generated from content delivered to mobile handsets and tablets is set to rise by nearly US$25bn over the next three years, reaching US$65bn by 2016, according to a new report from Juniper Research. Continue reading

Leave a comment

Filed under 3GPP LTE, 4G, Analysis, Billing & Customer Care Systems (BCCS), Content Delivery, Content Monetization, Content Syndication, LTE, Mobile Content, Security Content Management (SCM), Telecommunications

Renewal of smartphone jailbreaking and video remixing rights

Apple iPhone 3GS, Motorola Milestone and LG GW60

Jailbreaking now ok for ‘smart’ phones

Copyright Office Announces Exemptions to Mitigate DMCA Harms

San Francisco – The Electronic Frontier Foundation has won renewal of critical exemptions to the Digital Millennium Copyright Act (DMCA) in a new ruling, including the upholding of jailbreaking rights for smartphones – and new and expanded legal protections for video remixing. Continue reading

Leave a comment

Filed under BYOD, Content Creation, Content Management, Content management system (CMS), Content Monetization, Content Protection, Content Provision & Creation, Content Security, Content Syndication, Digital asset management, Digital Media Management (DMM), Digital rights management, Digitization, Enterprise Content Management, Industry News, Legal, Media asset management, Mobile Apps, Mobile communication, Mobile Content, Multichannel Delivery, Software, Streaming media, UGC - User-generated content, Video Content Management & Delivery (VCM), Web publishing management

Encrypted web moves step closer with HTTPS Everywhere 3.0

English: Logo of the Electronic Frontier Found...

The Electronic Frontier Foundation backing HTTPS Everywhere 3.0 web site encryption

EFF partners boost HTTPS Everywhere 3.0, now protecting 1,500 more sites

By ECM Plus staff

ECM Plus /London/ +++ The Electronic Frontier Foundation has stated its long-term mission to ‘encrypt as much of the Web as possible’.

The Foudantion said it now hopes to encrypt all of it.

According to the EFF, HTTPS Everywhere, the browser extension it produces with the ‘Tor’ Project and a community of volunteers, is now used by more than 2.5 million people around the world, the EFF said. Continue reading

Leave a comment

Filed under Content Security, Enterprise Content Management, Industry News, Information security, Open Source, Security Content Management (SCM)

Chaos abounds as BYOD costs prompt confusion

Confused Man Reading a Bill or Bank Statement

Cost confusion and chaos in BYOD (Photo: s_falkow)

Fiercely divided opinion on BYOD despite ‘hype’

By ECM Plus staff

ECM Plus /London/ +++ A new survey has revealed that fears are rising around the hidden costs of BYOD deployment – as well as ‘class divides’ and evidence that company managers are using BYOD to ‘pacify’  staff.

Moreover, some IT managers are even asking ‘is it worth surrendering control just to raise staff morale?’

Opinion is still divided when it comes to implementing ‘Bring Your Own Device’ strategies within businesses, with many at the top suggesting that such deployments create more problems than they solve. Continue reading

Leave a comment

Filed under Analysis, Budgeting, Business Process Management, Business Risk, BYOD, Collaboration platform, Content Security, Industry News, Information Management, Information security, Intranets & Portals, Mobile Apps, Risk Analysis, Risk Assessment, Risk Management, Software, Workflow

Hearing to probe cellular data legal status

English: A cell phone tower in Palatine, Illin...

A cell phone tower in Palatine, Illinois, USA.

Foundation fights for cellular phone users’ privacy in Tuesday hearing

By ECM Plus staff

ECM Plus +++ The Electronic Frontier Foundation will urge a federal appeals court on Tuesday to recognize cellular phone users’ privacy rights and require that the government obtain a warrant before collecting cell phone location information.

According to the Foundation, the oral argument is set for 9 a.m. on October 2nd in New Orleans.

At issue in Tuesday’s hearing are government requests for judicial orders authorizing the disclosure of 60 days of location data from two separate cell phone companies as part of a routine law enforcement investigation. Continue reading

Leave a comment

Filed under 3GPP LTE, 4G, Content Protection, Content Security, Data privacy, Data protection, Industry News, Legal, LTE-Advanced, M-DMC (Mobile Digital Media Controllers), M-DMD (Mobile Digital Media Downloaders), M-DMP (Mobile Digital Media Players), M-DMS (Mobile Digital Media Servers), M-DMU (Mobile Digital Media Uploaders), M2M (Mobile-to-Mobile), Mobile Analytics, Mobile communication, Mobile Content, Security Content Management (SCM), Software, WirelessMAN-Advanced

Foundation sues over email and phone hacking allegations

EFF_logo_white

Electronic Frontier Foundation

EFF says government ‘withholding information’ about ‘unconstitutional spying’

Washington, D.C. – The Electronic Frontier Foundation (EFF) sued the Department of Justice (DOJ) today, demanding answers about illegal email and telephone call surveillance at the National Security Agency (NSA). Continue reading

Leave a comment

Filed under Collaboration, Compliance, Content Governance, Content Protection, Content Security, Corporate Civic Responsibility (CCR), Corporate Governance, Customer Relations Management (CRM), Data Governance, Data mining, Data privacy, Data protection, Data storage, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Information security, Internal Controls, Policy Management, Regulatory Compliance, Risk Management, Security Content Management (SCM), Segregation of Duties (SoD), Software, Telecommunications, Web governance

Free DDoS survival guide on how to keep content alive

DDOS - Denial of Servicel

DDOS – Denial of Servicel (Photo credit: -= Treviño =-)

New guide from EFF – Keeping Your Site Alive – outlines how to keep content online in case of a Denial of Service Attack

By ECM Plus staff

ECM Plus /London/ +++ A new online guide from the Electronic Frontier Foundation outlines how website operators can fend off DDOS attacks and keep their sites alive and accessible. DDoS – Distributed Denial of Service attacks – the flooding websites with traffic in order to make them unavailable – have become an increasingly popular way to take down or block Internet content, EFF said. Continue reading

Leave a comment

Filed under Content Management, Content Security, Enterprise Content Management, Industry News, Security Content Management (SCM), WCM, Web accessibility, Web Performance Optimization (WPO), Web publishing management

Judicial hearing in Megaupload user data case

English: megaupload-download.net. Français : m...

Former federal judge Abraham Sofaer joins with EFF in fight for return of property

By ECM Plus staff

ECM Plus +++ The Electronic Frontier Foundation, ssisted by retired federal judge and former State Department legal adviser Abraham D. Sofaer, asked a federal judge Friday to order the return of data to Kyle Goodwin, a Megaupload user who lost all access to his files when the cloud storage service was shut down by the U.S. government. Continue reading

Leave a comment

Filed under Asset management, Cloud Computing, Content management system (CMS), Content Security, Data privacy, Data protection, Data storage, Industry News, Public Cloud, Rights Management, Storage, Trusted Cloud

Christmas cracker for content apps at Downloadbuyer.com

SFX Magix Samplitude Music Studio.
Image by NilmaBoston

Magix, Content Watch and other software discounts at online software emporium

By ECM Plus staff

ECM Plus +++ Online software superstore DownloadBuyer is offering 50 percent discounts on its wide range of software products throughout December 2011.

According to the company, the range with the discounts includes apps from mediAvatar, Xilisoft, Wondershare, Magix, O&O, eJay, Innoheim, MacPhun, ABBYY, UpdateStar, Emsisoft, Serif, Abylonsoft, BitDefender and Content Watch. Continue reading

Leave a comment

Filed under Content Creation, Content management system (CMS), Content Security, Digital asset management, Media asset management, Media Content, UGC - User-generated content, Vendor News, Video Content Management & Delivery (VCM), Workflow

New Hampshire home for ‘Cyber Kill Chain’ centre

United Kingdom

Howarth opens new intelligence centre in Farnborough, England. Image: stumayhew

“Minister For War” opens Lockheed Martin’s new cybersecurity intelligence centre in Hampshire

By ECM Plus staff

ECM Plus +++ Lockheed Martin has just opened its first Security Intelligence Centre in Farnborough, England, which the company said would extend its ‘global reach’ and would be ‘augmenting facilities in the United States’.

The new Farnborough centre was opened in the presence of Conservative Party Member of Parliament The Right Honourable Gerald Howarth representing the constituency of Aldershot, also in Hampshire, England. Continue reading

Leave a comment

Filed under Analytics & Metrics, Content Security, Industry News, Information Management, Information security, Intelligent Search, Knowledge Management, Security Content Management (SCM)

StarForce updates audio and video content protection app

The original logo.

Plus ca change: Media copyright issues have been around for years

Updated version for audio/visual content protection and licensing

By ECM Plus staf

ECM Plus +++ StarForce has just released an updated version of FrontLine Audio/Video, the professional software app for protecting audio and video content from unauthorised copying and distribution. Continue reading

Leave a comment

Filed under Content Monetization, Content Protection, Content Security, Data protection, Digital asset management, Digital Media Management (DMM), Digital rights management, Document asset management, Media asset management, Media Content, Vendor News

Flaws identified in AES encryption

Advanced Encryption Standard InfoBox Diagram

AES: Drowning or waving?

Researchers identify first flaws in the Advanced Encryption Standard

BY ECM PLUS STAFF

ECM Plus +++ Researchers have found a weakness in the AES algorithm.

According to cryptanalysts, they managed to come up with a clever new attack that can recover the secret key four times easier than anticipated by experts. The attack is a result of a long-term cryptanalysis project carried out by Andrey Bogdanov (K.U.Leuven, visiting Microsoft Research at the time of obtaining the results), Dmitry Khovratovich (Microsoft Research), and Christian Rechberger (ENS Paris, visiting Microsoft Research). Continue reading

Leave a comment

Filed under Business Risk, Content Protection, Content Security, Industry News, Information security, Regulatory Compliance, Risk Analysis, Risk Assessment, Risk Management, Security Content Management (SCM)

BRITISH RIOTS: Insurers extend terms for businesses and claimants

The cover of the British law The Riot Act from...

Riot Act protection extended to the max

Building and content insurance scheme extended to take into account businesses and communities

By ECM Plus staff

ECM Plus +++ According to reports, the Riot Act police compensation schemes will operate as normal and the insurance industry said it had promised to use its expertise to help the government and police implement the scheme.

ABI said they will be supporting the extension to the maximum of 42 days the amount of time claims can be made under the scheme.

ABI said it was revising its estimated figure of claims likely to be paid out by the insurance industry to be over £200 million. Continue reading

1 Comment

Filed under Business continuity, Content Protection, Content Security, Disaster Recovery, Industry News, Policy Management

Building and contents protected by insurance after riots

Protesters fighting police in Nørrebro, Copenhagen

Insurers: claim period to be extended

Association of British Insurers provide guidance on legal position of riot compensation

By ECM Plus staff

ECM Plus +++ According to the Association on British Insurers, on current estimates insured losses and damage suffered by individuals and British businesses are likely to be well over £100 million. Continue reading

Leave a comment

Filed under Asset management, Business Continuity, Business Risk, Content Protection, Content Security, Contingency Planning, GRC (Governance, Risk & Compliance), Industry News, Risk Analysis, Risk Assessment, Risk Management, Security Content Management (SCM)

Joomla releases 1.7, revs up open source cycle

Joomla!Day DE 2006

Joomla! 1.7 CMS unveils 1.7 with security tools

By ECM Plus staff

ECM Plus +++ Open source content management software specialist Joomla has just taken the wraps off the latest version 1.7 of its CMS offering.

The main updates in this version include search options, a defence against form manipulation and language-specific font settings. Continue reading

Leave a comment

Filed under Content management system (CMS), Enterprise Content Management, Open Source, Security Content Management (SCM), Vendor News, Web Content Management

Fourth amendment adds encryption protection for PDFs

Introducing Scroogle

WebSearch claims to be easier to use than other search engines. Image: Edgeworks Ltd.

New search and retrieval capabilities for encrypted PDF documents

By ECM Plus staff


ECM Plus
+++ New protection capabilities in the latest WebSearch v 4.0 component of DocuLex’s Archive Studio Content Management Suite can now search documents and retrieve content in real-time with password-protected PDF files. Continue reading

Leave a comment

Filed under Content Management, Content Security, Enterprise Search, Search, Security Content Management (SCM), Vendor News

Digital rights guide to protect computers and mobile devices published

Hugh D'Andrade's design to commemorate Electro...

Digital rights take centre stage in new publication

New ‘Know Your Digital Rights’ guide to constitutional liberties

By ELECTRONIC FRONTIER FOUNDATION

EFF +++ The Electronic Frontier Foundation has answers to these questions in our new “Know Your Digital Rights” guide, including easy-to-understand tips on interacting with police officers and other law enforcement officials.

“With smart phones, tablet computers, and laptops, we carry around with us an unprecedented amount of sensitive personal information,” said EFF Staff Attorney Hanni Fakhoury. “That smart phone in your pocket right now could contain email from your doctor or your kid’s teacher, not to mention detailed contact information for all of your friends and family members. Your laptop probably holds even more data — your Internet browsing history, family photo albums, and maybe even things like an electronic copy of your taxes or your employment agreement. This is sensitive data that’s worth protecting from prying eyes.” Continue reading

Leave a comment

Filed under Business Intelligence (BI), Business Risk, Compliance, Content Protection, Content Security, Data Governance, Data privacy, Digital rights management, Industry News, Information security, Media asset management, Mobile Apps, Mobile communication, Mobile Content, Risk Assessment, Risk Management

Document management helps detect jobsworth jiggery-pokery

NAMM 2007 - Mr Jobsworth.

The Enemy Within? Public sector jobsworth internal fraud increasing. (Image by Eleventh Earl of Mar via Flickr)

Preventing rising public sector employee ‘jobsworth’ fraud tackled by document management, says document management vendor Version One

By ECM Plus staff

ECM Plus +++ Reported cases of internal fraud are increasing following spending review cuts, according to dcument magement software vendor Version One.

The company said it was now urging public sector departments, agencies and quangos to invest in its electronic document imaging and cheque printing software, to combat rising levels of so-called ‘jobsworth terrorists’ or ‘jobsworth-jacking’ – public sector employee fraudsters. Continue reading

Leave a comment

Filed under Analysis, Compliance, Content Protection, Content Security, Data privacy, Data protection, Data storage, GRC (Governance, Risk & Compliance), Information Governance, Internal Controls, Risk Analysis, Risk Management, Segregation of Duties (SoD)

Skype hack: Breach could have been prevented – StarForce

Skype Technologies S.A. logo

US$8.5 billion VoIP service hacked

Hack could have been delayed or prevented says StarForce

By ECM Plus staff

ECM Plus +++ The recent high-profile hacking of Skype could have been prevented – or at least delayed – by better software protection, according to copy protection software specialist StarForce Technologies.

According to the company, Russian hacker Efin Bushmanov has cracked Skype’s protocol and data encryption mechanisms. Bushmanov has also made it publicly available for the public. Continue reading

Leave a comment

Filed under Content Protection, Content Security, Data privacy, Data protection, Industry News, Security Content Management (SCM)

WEEKEND PLUS: EFF lawsuit demands ‘secret memo’ be revealed

Logo of the Electronic Frontier Foundation

EFF submits Freedom of Information Act request

Foundation demands answers about secret surveillance law memo; Justice Department withholding information on controversial legal theory

The Electronic Frontier Foundation (EFF) has filed a Freedom of Information Act (FOIA) suit against the Department of Justice (DOJ), demanding the release of a secret legal memo used to justify FBI access to Americans’ telephone records without any legal process or oversight. Continue reading

Leave a comment

Filed under Content Security, Document Management, eDiscovery, Forms management, processing, eForms, Industry News, Records Management, Telecommunications

RFID hacked: TV station finds chips are toast

RFID chip pulled from new credit card

RFID chip pulled from a credit card

Television group reveals serious security flaws with RFID-equipped credit and debit cards

By ECM Plus staff

ECM Plus +++ A consumer television report into the insecurity of radio frequency ID – or so-called ‘RFID’ -equipped credit and debit card chips has shocked the security industry.

One vendor, SecurEnvoy said the apparent ease with which RFID has been hacked to create a `magic wand’. With the ability for anyone to effectively read RFID cards at a distance clearly demonstrates that RFID is no longers fit for purpose, observers say. Continue reading

1 Comment

Filed under Content Security, Industry News, Mobile Analytics, Mobile Apps, Mobile communication, Mobile Content, Risk Assessment, Risk Management, Scanning, Security Content Management (SCM), Telecommunications

Oracle database disasters a thing of the past with Kroll’s recovery drive

Media that has suffered a catastrophic electro...

Fried disk drive with burnt chips

Ontrack data recovery spins to the rescue

by ECM Plus staff

ECM Plus +++ Kroll Ontrack has taken the wraps off its latest Ontrack Data Recovery service for Oracle systems, which now includes popular virtual environments.

According to Kroll, recovery efforts can now be further complicated when databases are hosted inside virtual machines or in the cloud.  Continue reading

Leave a comment

Filed under Business continuity, Cloud Computing, Content Security, Data storage, Database management, Disaster Recovery, Enterprise Cloud, High Availability, Hybrid Cloud, Information Management, Private Cloud, Public Cloud, Risk Management, Vendor News, Virtualization, VM2VM, VPS Cloud

Upcoming UK Census data offshoring destined for more debacles

Divisions of the United Kingdom

ONS offshoring Briton's personal data for £150m

Report reveals 2011 UK Census of private data set to go offshore to foreign agencies, increasing probability of yet more Government-sanctioned personal data breaches

ECM Plus – A new Guardian report indicates that the British Government’s Office of National Statistics is to pay a foreign agency £150 million in taxpayer money to undertake the collection and processing of Britain’s families and personal income data, with new extra questions in this year’s Census demanding to know the details of sources of incomes as well as additional personal data in the 32-page questionnaire, now destined to go offshore in the government cutbacks and ‘efficiency-savings’ outsourcing deal. Continue reading

Leave a comment

Filed under Business Intelligence (BI), Content Categorisation, Content Fingerprinting, Content Management, Content Monetization, Content Protection, Content Security, Data centres, Data Governance, Data privacy, Data protection, Data storage, Document archiving & retrieval, Document Management, Document scanning & imaging, Forms management, processing, eForms, Information Governance, Information security, Records Management, Scanning, Search, Security Content Management (SCM)