Skip to main content
Home Home

Header secondary menu

  • Contact Us

Main Nav - Markets

  • Column top
    • Contact Us
  • Who We Serve
    • Advertisers
    • Communications providers
    • Content & Streaming providers
    • MVPDS & Operators
    • Technology providers
  • Column right
    • Login
    • Resources
    • Blog
    • News
    • Partners
    • Events
    • Support
    • About
Subnav From Cookie

Blog

Markets

The Changing Needs and Expectations of TV Customers

The shift in how consumers watch TV 

The entertainment landscape and the way people watch TV has undergone a seismic shift over the past decade. Streaming services have surged in popularity, fundamentally changing how audiences access and engage with content.  

On...

Read More

Sports content, AI, and advertising: Lessons from 2024 and predictions for 2025

With 2025 well underway, it’s the perfect time to reflect on how the media and entertainment industry measured up to our predictions from last year. The verdict? Many of our experts’ forecasts were right on the mark, while others unfolded in unexpected...

Read More

Break the hive mentality: going vendor agnostic with DataBee

It’s easy to get caught up in the hive mentality, and it happens more than you think when purchasing cybersecurity products and services.  

abstract cloud pulling data from device

Recently, the Federal Trade Commission has been launching investigations into anticompetitive practices related to the cybersecurity industry. Anti-competitive practices can...

Read More

Why a data fabric can make your data-driven security and compliance analytics easier

Data, data everywhere, and not a drop of insight. The enterprise collects terabytes of data from hundreds of different, disconnected security tools. Yet, while organizations have vast amounts of data, they struggle to be data-driven.  

abstract blue lock in data landscape

Internal stakeholders have their own tools to help...

Read More

Managed Terrestrial Distribution gets more channels, more HD, and more value to customers and operators alike

It’s been three years since MVPDs accommodated the big 5G spectrum reallocation, and three years since we started helping companies to answer the question, “what would it look like to move our delivery model from orbit and down to earth?” Since then, our...

Read More

Ad creative production: Centralize or decentralize?

The shift from traditional advertising models to more diverse, digital-focused strategies has brought brand marketers to an interesting crossroads: the choice between centralized production, which offers streamlined efficiency and brand consistency, and decentralized production/fragmentation, a model that can deliver greater flexibility, diverse creative...

Read More

Monitoring and logging: the eyes and ears of security

Why do monitoring and logging matter?  

Although this is a foundational question in cybersecurity and networking, National Cybersecurity Awareness Month makes this a great time to (re)visit important topics.  

Monitoring and logging are very similar to security cameras and home alarm systems. They...

Read More

How Continuous Controls Monitoring (CCM) can make cybersecurity best practices even better

Like many cybersecurity vendors, we like to keep an eye out for the publication of the Verizon Data Breach Investigations Report (DBIR) each year. It’s been a reliable way to track the actors, tactics and targets that have forced the need for a...

Read More

Status Update: DataBee is a now an AWS Security Competency Partner

AWS Partner badge for Security Software CompetencyWe are proud to announce that DataBee is recognized as one of only 35 companies to achieve the AWS Security Competency in Threat Detection and Response. We have worked diligently to help customers gain faster, better insights from their security data, making today...

Read More

Live sports video: A winning playbook for content delivery and management

For streaming, broadcasting, or advertising, live sports represent some of the most exciting and most complex events to manage — and some of the most lucrative, particularly when it comes to breaking into new markets.  

But when you’re only live once...

Read More

Mastering DORA compliance and enhancing resilience with DataBee

Recently, DataBee hosted a webinar focused on the Digital Operational Resilience Act (DORA), a pivotal piece of EU legislation that is set to reshape the cybersecurity landscape for financial institutions. The talk featured experts Tom Schneider, Cybersecurity GRC Professional Services Consultant at...

Read More

Market opportunities in MENA for streaming, advertising, and sports

With a subscription video on demand (SVOD) services market expected to surpass $1.2 billion by the end of this year, it’s no wonder that entertainment and media companies are looking at the Middle East and North Africa (MENA) with increased focus. While the...

Read More

DataBee: Who do you think you are?

DataBee Mascot2024 has been a big “events” year for DataBee as we’ve strived to raise awareness of the new business and the DataBee Hive™ security, risk and compliance data fabric platform. We’ve participated in events across North America and EMEA including Black Hat...

Read More

Compliance Takes a Village: Celebrating National Compliance Officer Day

If the proverb is, it takes a village to raise a child, then the corollary in the business world is that it takes a village to get compliance right. And in this analogy, compliance officers are the mayor of this village. Compliance officers...

Read More

Best practices for PCI DSS compliance...and how DataBee for CCM helps

For planning compliance with the Payment Card Industry Data Security Standard (PCI DSS), the PCI Security Standards Council (SSC) supplies a document that provides excellent foundational advice for both overall cybersecurity, and PCI DSS compliance. Organizations may already be aware of it, but...

Read More

Enter the golden age of threat detection with automated detection chaining

During my time as a SOC analyst, triaging and correlating alerts often felt like solving a puzzle without the box or knowing if you had all the pieces.  

My days consisted of investigating alerts in an always-growing incident queue. Investigations could start with...

Read More

You've reduced data, so what's next

Organizations often adopt data tiering to reduce the amount of data that they send to their analytics tools, like Security Information and Event Management (SIEM) solutions. By diverting data to an object store or a data lake, organizations are able to manage and...

Read More

The value of OCSF from the point of view of a data scientist

Data can come in all shapes and sizes. As the “data guy” here at DataBee® (and the “SIEM guy” in a past life), I’ve worked plenty with logs and data feeds in different formats, structures, and sizes delivered using different methods and protocols. ...

Read More

Political Advertising: the race to every screen moves fast

If there’s one thing that’s self-evident in this U.S. presidential election year, it’s this: political advertising moves fast.  

"For agencies representing the vast number of campaigns across state and national campaigns, it’s not just about the sheer volume, but also about the need...

Read More

The challenges of a converged security program

It’s commonplace these days to assume we can learn everything about someone from their digital activity – after all, people share so much on social media and over digital chats. However, advanced threats are more careful on digital. To catch advanced threats, therefore...

Read More

Vulnerabilities and misconfigurations: the CMDB's invasive species

abstract knowledge is power quote with books behind

“Knowledge is power.” Whether you attribute this to Sir Francis Bacon or Thomas Jefferson, you’ve probably heard it before. In the context of IT and security, knowing your assets, who owns them, and how they’re connected within your environment are fundamental first steps...

Read More

Continuous controls monitoring (CCM): Your secret weapon to navigating DORA

Stack of coins Financial institutions are a critical backbone of the local and geographical – and world – economy. As such the financial services industry is highly regulated and often faces new compliance mandates and requirements. Threat actors target the industry because it manages and processes...

Read More

Channels are changing: Cloud-based origination and FAST

Linear television isn’t dead, but it certainly isn’t the same as it was even five years ago. As content delivery and consumption shift toward digital platforms, content owners and distributors find themselves navigating a rapidly evolving landscape. The rise of streaming services has...

Read More

100% exciting, 100 people strong (and growing)

When you join an organization the size of Comcast, it’s easy for outsiders to see only “Fortune 29 Company!” or “huge enterprise!”. But tell that to the DataBee team – we’ve been in start-up land since October 2022. And it’s been an...

Read More

DataBee's guide to sweetening your RSAC experience

Noopur Davis, Comcast’s Chief Information Security Officer recently talked about bringing digital transformation to cybersecurity, where she stated, “The questions we dare to ask ourselves become more audacious each day.” In cybersecurity, this audacity is the spark that ignites innovation. By embracing bold...

Read More

All SIEMs Go: stitching together related alerts from multiple SIEMs

Today’s security information and event management (SIEMs) platforms do more than log collection and management. They are a critical tool used by security analysts and teams to run advanced security analytics and deliver unified threat detection and search capabilities.

decorative image of a closeup on a laptop

A SIEM’s original purpose...

Read More

Seeing the big (security insights) picture with DataBee

The evolution of digital photography mimics the changes that many enterprise organizations face when trying to understand their cybersecurity controls and compliance posture. Since the late 1990s, technology has transformed photograph development from an analog, manual process into a digital, automated field. These...

Read More

Bridging the GRC Gap

Misconceptions and miscommunications? Not with continuous controls monitoring from DataBee. Learn how you can reduce audit costs and improve security outcomes.
Read More

The DataBee Hive hits Orlando for the 2024 Gartner® Data & Analytics Summit

In a great blog on bringing digital transformation to cybersecurity, Comcast CISO Noopur Davis wrote, “Data is the currency of the 21st century — it helps you examine the past, react to the present, and predict the future.” Truer words were never...

Read More

Our 2024 forecast for media and advertising trends

As we approach the halfway point of the decade, events of the past year underscore just how appropriate the name the “Roaring 20s” really is for the current era of media and entertainment. From dramatic advances in AI and ML technology and crumbling...

Read More

3 Hot Takes on Cybersecurity: SIEMs, GenAI, and more

Missed our Cybersecurity Hot Takes webinar? Lucky for you, you can watch the on-demand recording now!  

We dived into cybersecurity’s burning questions with Roland Cloutier, former CISO at Tiktok and ADP, Edward Asiedu, Senior Principal of Cybersecurity Solutions at DataBee, and Amy...

Read More

Squeaky Clean: Security Hygiene with DataBee

Enterprises have an ever-growing asset and user population. As organizations become more complex thanks to innovation in technology, it becomes increasingly difficult to track all assets in the environment. It's difficult to secure a user or device you may not be aware of....

Read More

Finding security threats with DataBee from Comcast Technology Solutions

Last week, DataBee® announced the general availability of DataBee v2.0. Alongside a new strategic technology partnership with Databricks, we released new cybersecurity and Payment Card Industry Data Security Standard (PCI DSS) 4.0 reporting capabilities.

In this blog, we’ll dive into the new...

Read More

DataBee and Databricks: Business-ready datasets for security, risk, and compliance

In today's fast-paced and data-driven world, businesses are constantly seeking ways to gain a competitive edge. One of the most valuable assets these businesses have is their data. By analyzing and deriving insights from their data, organizations can make informed decisions, manage organizational...

Read More

Five Benefits of a Data-Centric Continuous Controls Monitoring Solution

For as long as digital information has needed to be secured, security and risk management (SRM) leaders and governance, risk and compliance (GRC) leaders have asked: Are all of my controls working as expected? Are there any gaps in security coverage, and if...

Read More

DataBee is a Leader in Governance, Risk, and Compliance in Snowflake's The Next Generation of Cybersecurity Applications

Today, Snowflake recognized DataBee, part of Comcast Technology Solutions, as a Leader in the Governance, Risk & Compliance (GRC) Category in Snowflake’s The Next Generation of Cybersecurity Applications. As the Director of Strategic Sales and Go-to-Market Strategy, I am proud to help...

Read More

DataBee appoints Ivan Foreman for EMEA expansion leadership

You may be surprised to know this, but the security data issues that challenge US-based security teams are issues felt ’round the world. Of course, I’m kidding: These challenges have been worked on, talked about, and written about for years and continue to...

Read More

Putting your business data to work: threat hunting edition

Detectives, bounty hunters, investigative reporters, threat hunters. They all share something in common: When they’re hot on a scent, they’re going to follow it. In the world of cybersecurity, threat hunters can use artifacts left behind by a bad actor or even a...

Read More

Trick or threat: 5 tips to discovering — and thwarting — lateral movement with data 

We know ghouls and ghosts aren’t the only things keeping you up this spooky season. Bad actors are getting smarter with their attacks, using tactics and techniques that baffle even the most seasoned cyber professionals.  

Discovering — and thwarting — lateral movement can...

Read More
  • Load More

Footer menu

    • Advertisers
    • Communications Providers
    • Content & Streaming Providers
    • MVPDs & Operators
    • Technology Providers
  • About
    • Careers
    • Meet our global teams
  • Resources
    • Blog
    • All CTS Events
    • Partners
    • Support
  • Contact
    • LinkedIn
    • Twitter
    • Facebook
    • Youtube
  • Logins

Footer copyrights

  • Privacy Policy
  • Terms & Conditions
  • Do Not Sell My Personal Information
  • CA Notice at Collection
  • Sitemap
  • © 2025 Comcast Technology Solutions