securing SaaS

  • 2 women working at coding in an office.
    | Blog

    Even with zero-day exploits on the rise, software updates remain critical

    Two related zero-day vulnerabilities in Google Chrome and Microsoft Windows were recently discovered out in the wild, and may be part of a broader trend in cyber crimes. Here’s why software updates are still the best defense.
  • A bunch of computer monitors with code and locks on them.
    | Blog

    New Content Protection Option for Sending Files with Media Shuttle

    With the latest high-profile cyberattack within Media & Entertainment, this one on HBO, occurring just months after the much-reported hack of Netflix’s Orange is the New Black, cybersecurity and the importance of safeguarding valuable media content is once again on everyone’s mind.
  • A closeup of fingers on a keyboard.
    | Blog

    The Art of the Hack debunks 20 information security myths

    Is our personal information more vulnerable than a year ago? 84 percent of Americans think so. In order to bring some light to the many information security myths that plague our paranoid nation, David Spark of Art of the Hack reached out to dozens of industry experts, including Signiant’s CTO Ian Hamilton.
  • A black jacket with the word security on the back of it.
    | Blog

    The importance of usability for secure software

    Software security and User Experience Design are both popular subjects in tech media, but they usually draw different audiences and the important space where they overlap gets far less attention. After all, except for high-profile cyber breaches, software security is not nearly as trendy as “UX”. And thank goodness for the trend. Though we’ve come a long way, this 2007 Dilbert comic still holds some hilarious yet painful truth about how much we still need to improve user experience in regard to security measures.
  • | Blog

    Will Hollywood’s latest cyber-attack further inhibit cloud adoption?

    Within Media & Entertainment, those responsible for the technology future of their companies are facing a dilemma. Cloud solutions provide what might be the only answer to escalating data amounts within an increasingly agile industry. But security fears inhibit many from taking advantage of SaaS and other cloud technologies.
  • A weathered, blue door locked with a large chain and a padlock.
    | Blog

    Securing SaaS, Part 4: Physical Security and Breach Detection

    Operational policies and procedures are key to the security of any SaaS offering. Signiant operational policies and procedures are established in accordance with industry standards for service organization controls. Connectivity between the production service environment and Signiant business operations is restricted in accordance with least privilege and defense-in-depth principals. Fully independent production and development Media Shuttle environments are also maintained. This blog highlights some of the operational controls in place for production elements of the cloud environment.
  • | Blog

    Securing SaaS, Part 1: The architecture of secure design

    When you are in the midst of the tedious editorial process of a big project, the security of your files as they pass among the various players on your team isn’t something you want to think about. Signiant designed Media Shuttle as a file sharing solution that is especially conducive to the flow of media production and post-production with a technical backend as rigorous as your IT team.