June 23-24 | An Event for Expanding the Human Connection Learn More & Register

Security

image

Revisiting Security Fundamentals Part 3: Time to Examine Availability

November 12, 2019

As I discussed in parts 1 and 2 of this series, cybersecurity is complex. Security engineers rely on the application of fundamental principles to keep their jobs manageable. In the first installment of this series, I focused on confidentiality, and in the second installment, I discussed integrity. In this third and final part of the […]

Read More
image

Revisiting Security Fundamentals Part 2: Integrity

October 24, 2019

Let’s revisit the fundamentals of security during this year’s security awareness month – part 2: Integrity. As I discussed in Part 1 of this series, cybersecurity is complex. Security engineers rely on the application of fundamental principles to keep their jobs manageable. The first blog focused on confidentiality. This second part will address integrity. The […]

Read More
image

False Base Station or IMSI Catcher: What You Need to Know

October 23, 2019

You might have heard of False Base Station (FBS), Rogue Base Station (RBS), International Mobile Subscriber Identifier (IMSI) Catcher or Stingray. All four of these terminologies refer to a tool consisting of hardware and software that allow for passive and active attacks against mobile subscribers over radio access networks (RANs). The attacking tool (referred to […]

Read More
image

Revisiting Security Fundamentals

October 17, 2019

It’s Cybersecurity Awareness Month—time to study up! Cybersecurity is a complex topic. The engineers who address cybersecurity must not only be security experts; they must also be experts in the technologies they secure. In addition, they have to understand the ways that the technologies they support and use might be vulnerable and open to attack. […]

Read More
image

Vaccinate Your Network to Prevent the Spread of DDoS Attacks

October 2, 2019

CableLabs has developed a method to mitigate Distributed Denial of Service (DDoS) attacks at the source, before they become a problem. By blocking these devices at the source, service providers can help customers identify and fix compromised devices on their network. DDoS Is a Growing Threat DDoS attacks and other cyberattacks cost operators billions of […]

Read More
image

CableLabs® Micronets Security Reference Code Is Now Open Source

March 1, 2019

In November, we introduced CableLabs micronets, a next-generation on-premise networking platform focused on providing adaptive security for all devices connecting to home or small business networks. Micronets uses dynamic micro-segmentation to manage the connectivity to each device and is designed to provide seamless and transparent security without burdening end users with the technical aspects of […]

Read More
image

Comparing 4G and 5G Authentication: What You Need to Know and Why

February 6, 2019

The 5G (fifth generation) of cellular mobile communication is among the hottest technologies today and is under development by 3GPP. Besides providing faster speed, higher bandwidth, and lower latency, 5G also supports more use cases, such as: Enhanced Mobile Broadband (eMBB) Massive Machine Type Communications (mMTC) Ultra Reliable Low Latency Communications (uRLLC) With global deployment […]

Read More
image

Security for Blockchains and Distributed Ledgers

January 10, 2019

Empirical evidence reveals an inimical belief that blockchains and distributed ledger technologies (DLTs) are inherently secure because they use cryptography, employ hashing algorithms and have public/private keypairs—in short, a belief that the data in these systems is extremely unlikely to become exposed. After evaluating requirements and deciding to utilize a blockchain solution, security is important […]

Read More
image

Micronets: Enterprise-Level Security Is No Longer Just For Enterprises

November 14, 2018

Today we are introducing CableLabs® Micronets, a framework that simplifies and helps secure increasingly complex home and small business networks. As we add devices to our networks such as cell phones, computers, printers, thermostats, appliances, lights and even medical monitors, our networks become more susceptible to intrusions. Micronets automatically segments devices into separate, policy-driven trust […]

Read More
image

The Need for IoT Standards

August 29, 2018

Imagine a world in which you can tell your phone you’re leaving work, and your washing machine automatically starts the laundry at home so that it’s ready for the dryer when you arrive. Or your oven begins preheating so that you can pop a pizza in when you get home. Or, on cold days, your […]

Read More