securing SaaS

  • 2 women working at coding in an office.

    Even with zero-day exploits on the rise, software updates remain critical

    Two related zero-day vulnerabilities in Google Chrome and Microsoft Windows were recently discovered out in the wild, and may be part of a broader trend in cyber crimes. Here’s why software updates are still the best defense.
  • A bunch of computer monitors with code and locks on them.

    New Content Protection Option for Sending Files with Media Shuttle

    With the latest high-profile cyberattack within Media & Entertainment, this one on HBO, occurring just months after the much-reported hack of Netflix’s Orange is the New Black, cybersecurity and the importance of safeguarding valuable media content is once again on everyone’s mind.
  • A closeup of fingers on a keyboard.

    The Art of the Hack debunks 20 information security myths

    Is our personal information more vulnerable than a year ago? 84 percent of Americans think so. In order to bring some light to the many information security myths that plague our paranoid nation, David Spark of Art of the Hack reached out to dozens of industry experts, including Signiant’s CTO Ian Hamilton.
  • An audience, some with hands raised in the air, in front of a band on stage.

    Signiant to Share Insights into Media and Entertainment Industry Trends at 2015 NAB Show

    Signiant executives will be participating in prestigious panel sessions at the 2015 NAB Show, the world’s largest electronic media show covering the creation, management and delivery of content across all platforms. Signiant CEO Margaret Craig and CTO Ian Hamilton will join industry visionaries to discuss the business and technology trends that will shape the industry in the coming year.
  • A black jacket with the word security on the back of it.

    The importance of usability for secure software

    Software security and User Experience Design are both popular subjects in tech media, but they usually draw different audiences and the important space where they overlap gets far less attention. After all, except for high-profile cyber breaches, software security is not nearly as trendy as “UX”. And thank goodness for the trend. Though we’ve come a long way, this 2007 Dilbert comic still holds some hilarious yet painful truth about how much we still need to improve user experience in regard to security measures.
  • Will Hollywood’s latest cyber-attack further inhibit cloud adoption?

    Within Media & Entertainment, those responsible for the technology future of their companies are facing a dilemma. Cloud solutions provide what might be the only answer to escalating data amounts within an increasingly agile industry. But security fears inhibit many from taking advantage of SaaS and other cloud technologies.
  • Content Protection Summit 2014 Recap: Protecting content in the cloud

    Last week, Signiant CTO Ian Hamilton joined a panel discussion at the 5th annual Content Protection Summit in Hollywood, looking at security practices for cloud solutions within the media industry.
  • A weathered, blue door locked with a large chain and a padlock.

    Securing SaaS, Part 4: Physical Security and Breach Detection

    Operational policies and procedures are key to the security of any SaaS offering. Signiant operational policies and procedures are established in accordance with industry standards for service organization controls. Connectivity between the production service environment and Signiant business operations is restricted in accordance with least privilege and defense-in-depth principals. Fully independent production and development Media Shuttle environments are also maintained. This blog highlights some of the operational controls in place for production elements of the cloud environment.
  • A weathered, blue door locked with a large chain and a padlock.

    Securing SaaS, Part 3: Design Principles for Safe Media Transfer and Secure Data Storage

    In Part 1 of the Securing SaaS series, we offered a background of the hybrid SaaS Architecture that Media Shuttle relies on for safe, easy media transfer. Part 2 looked specifically at security related to customer provisioning, user rights, and transfer validation. Now, we can look at specific design principles including data storage, audit collection, and secure-by-default.
  • Securing SaaS, Part 2: The human factor, user rights and cloud tiers in file transfer

    In Part 1, we discussed the hybrid SaaS architecture behind Media Shuttle including file storage, the cloud tier, TLS, and password policies. Now that we have the basics out of the way, let’s turn to the security behind the customer journey—from setup with the help of Signiant Customer Care to authorized transfers.
  • Securing SaaS, Part 1: The architecture of secure design

    When you are in the midst of the tedious editorial process of a big project, the security of your files as they pass among the various players on your team isn’t something you want to think about. Signiant designed Media Shuttle as a file sharing solution that is especially conducive to the flow of media production and post-production with a technical backend as rigorous as your IT team.