online piracy
Looking for the most refined weapon to combat piracy? Use data
By Orly Amsalem, data scientist at Cisco Who is Stealing Credentials? Imagine a hacker. You’re probably visualizing a blurred image in a white mask or a black hoodie, typing lines of code, determined to hack into secure sites, steal credit cards, and collect valuable, previously private data. Now i…
“We Love our Pirates” – Crowdfunding Piracy
In the past few years there have been all kinds of interesting crowdfunding projects – namely enlisting the masses to raise funds for new innovative ideas. In fact, this has been recognized as a powerful mechanism for launching new products. One particularly unusual (not to say galling) crowdfunding…
Illegal Streaming of Pay TV – Is It a Pirate Treasure Island?
In our previous blog post—on the scope of illegal streaming—we analyzed one of the forums that hosts illegal streaming server offers and concluded that it reaches at least 285,000 viewers. That’s an impressive figure. But what does it mean in financial terms? Or to be more specific, how much are pir…
Media Transformation: Security Is Key
Scale, speed, new consumer experiences — these goals all come to mind as drivers of the massive transformation happening in media & entertainment. When it comes to the underlying IP and cloud technology needed to bring this transformation to life, Cisco has a unique ability to deliver comp…