Security

image

10G Integrity: The DOCSIS® 4.0 Specification and Its New Authentication and Authorization Framework

May 28, 2020

One of the pillars of the 10G platform is security. Simplicity, integrity, confidentiality and availability are all different aspects of Cable’s 10G security platform. In this work, we want to talk about the integrity (authentication) enhancements, that have been developing for the next generation of DOCSIS® networks, and how they update the security profiles of […]

Read More
image

With Great Bandwidth, Comes Great Responsibility

May 5, 2020

Cable’s next generation, 10G networks, holds the promise to deliver symmetrical multi-gigabit speeds that are 100 times faster than what some consumers are currently experiencing today. This great leap forward will enable services and experiences that will drive internet innovation for years to come. It is our mutual responsibility to assure that devices we connect […]

Read More
image

Revisiting Security Fundamentals Part 3: Time to Examine Availability

November 12, 2019

As I discussed in parts 1 and 2 of this series, cybersecurity is complex. Security engineers rely on the application of fundamental principles to keep their jobs manageable. In the first installment of this series, I focused on confidentiality, and in the second installment, I discussed integrity. In this third and final part of the […]

Read More
image

Revisiting Security Fundamentals Part 2: Integrity

October 24, 2019

Let’s revisit the fundamentals of security during this year’s security awareness month – part 2: Integrity. As I discussed in Part 1 of this series, cybersecurity is complex. Security engineers rely on the application of fundamental principles to keep their jobs manageable. The first blog focused on confidentiality. This second part will address integrity. The […]

Read More
image

False Base Station or IMSI Catcher: What You Need to Know

October 23, 2019

You might have heard of False Base Station (FBS), Rogue Base Station (RBS), International Mobile Subscriber Identifier (IMSI) Catcher or Stingray. All four of these terminologies refer to a tool consisting of hardware and software that allow for passive and active attacks against mobile subscribers over radio access networks (RANs). The attacking tool (referred to […]

Read More
image

Revisiting Security Fundamentals

October 17, 2019

It’s Cybersecurity Awareness Month—time to study up! Cybersecurity is a complex topic. The engineers who address cybersecurity must not only be security experts; they must also be experts in the technologies they secure. In addition, they have to understand the ways that the technologies they support and use might be vulnerable and open to attack. […]

Read More
image

Vaccinate Your Network to Prevent the Spread of DDoS Attacks

October 2, 2019

CableLabs has developed a method to mitigate Distributed Denial of Service (DDoS) attacks at the source, before they become a problem. By blocking these devices at the source, service providers can help customers identify and fix compromised devices on their network. DDoS Is a Growing Threat DDoS attacks and other cyberattacks cost operators billions of […]

Read More
image

CableLabs® Micronets Security Reference Code Is Now Open Source

March 1, 2019

In November, we introduced CableLabs micronets, a next-generation on-premise networking platform focused on providing adaptive security for all devices connecting to home or small business networks. Micronets uses dynamic micro-segmentation to manage the connectivity to each device and is designed to provide seamless and transparent security without burdening end users with the technical aspects of […]

Read More
image

Comparing 4G and 5G Authentication: What You Need to Know and Why

February 6, 2019

The 5G (fifth generation) of cellular mobile communication is among the hottest technologies today and is under development by 3GPP. Besides providing faster speed, higher bandwidth, and lower latency, 5G also supports more use cases, such as: Enhanced Mobile Broadband (eMBB) Massive Machine Type Communications (mMTC) Ultra Reliable Low Latency Communications (uRLLC) With global deployment […]

Read More
image

Security for Blockchains and Distributed Ledgers

January 10, 2019

Empirical evidence reveals an inimical belief that blockchains and distributed ledger technologies (DLTs) are inherently secure because they use cryptography, employ hashing algorithms and have public/private keypairs—in short, a belief that the data in these systems is extremely unlikely to become exposed. After evaluating requirements and deciding to utilize a blockchain solution, security is important […]

Read More