Technology Vision
Four CableLabs Security and Privacy Impact Zones Making a Safer Internet

Key Points
- CableLabs technologies, along with best common practices across the engagement spectrum, are helping deliver secure online experiences for users around the world.
- Collaborating with broadband operators, manufacturers and standards bodies, CableLabs is leading industry initiatives to make the internet safer.
As the global adoption of emerging technologies continues to intensify vulnerability to cyber threats, now is a good time to remind ourselves of CableLabs’ ongoing efforts to keep everyone secure. CableLabs takes pride in making every online experience safer and more efficient, expanding the ways enterprises can operate and improving the ways we all individually connect and live online.
At Home
For Enterprises
In the Core Network
Secure Network Protocols
Further CableLabs Security and Privacy Work
Security
Available Now: Ransomware Active Attack Response Best Common Practices Document

Ransomware continues to wreak havoc on global industry, governments, individuals and enterprises. Research shows that more than a third of all businesses were victims of ransomware in 2021, and now over a quarter of all malware has been reprovisioned for ransom. Ransomware is the result of malicious attackers compromising a system or network and exfiltrating or encrypting encountered data; victims are then solicited for return of control or access to their data. In many attacks, separate ransoms are demanded for return of the data and for promises not to release that data publicly.
Responding to the SMB Need
How It Works
Security
Raising the Bar on Gateway Device Security

Today, CableLabs® has publicly released a set of best common practices (BCP) to enhance the security of cable modems, integrated access points, and home routers (collectively, known as “gateway devices”) against malicious activity and other cyber threats. This work builds on and extends CableLabs’ and the cable industry’s longstanding leadership in cybersecurity to ensure a consistent and robust baseline for gateway device security, increased economies of scale, and an ontology for simplified communication and procurement between network operators and device manufacturers.
Security
Security for Blockchains and Distributed Ledgers

Empirical evidence reveals an inimical belief that blockchains and distributed ledger technologies (DLTs) are inherently secure because they use cryptography, employ hashing algorithms and have public/private keypairs—in short, a belief that the data in these systems is extremely unlikely to become exposed. After evaluating requirements and deciding to utilize a blockchain solution, security is important to consider from the start.
Smart Contract Injection
Replay Attacks
History Revision Attacks
Permanence Poisoning
Confidential Information Leaks
Participant Authentication Failure
Node Spoofing
Node Misbehavior
Untrustworthy Node-Chain Seam
General Security Hazards
Security
But it’s Just a Light Bulb, Does it Need All This Security?

A version of this blog was published by S&P Global Market Intelligence.
Security
Device Security in the Internet of Things


How to Affect Change In Security
Who is Looking out for Your Privacy?
Security – Where, When and How
Forming Trust
Working Together Toward Network Protection
Convergence
Consumer
Giving Up Bad Security Habits

During the season of Lent in my upbringing meant I was going to be giving something up. This year, instead of giving something up, I have decided to help those around me clean up their security and suggest you help a friend in turn. Statistics show that you probably know someone who could use a hand modifying their most egregious electronic security habits - maybe we should term it "insecurity habits." None of us are perfect but these three initial steps will help your friend.