Brian Scriber

Distinguished Technologist and VP of Security & Privacy Technologies


Technology Vision

Four CableLabs Security and Privacy Impact Zones Making a Safer Internet

Four CableLabs Security and Privacy Impact Zones Creating a Safer Internet

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

Jan 30, 2025

Key Points

  • CableLabs technologies, along with best common practices across the engagement spectrum, are helping deliver secure online experiences for users around the world.
  • Collaborating with broadband operators, manufacturers and standards bodies, CableLabs is leading industry initiatives to make the internet safer.

As the global adoption of emerging technologies continues to intensify vulnerability to cyber threats, now is a good time to remind ourselves of CableLabs’ ongoing efforts to keep everyone secure. CableLabs takes pride in making every online experience safer and more efficient, expanding the ways enterprises can operate and improving the ways we all individually connect and live online.

Security

Available Now: Ransomware Active Attack Response Best Common Practices Document

Ransomware Active Attack Response Best Common Practices Announcement

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

May 23, 2023

Ransomware continues to wreak havoc on global industry, governments, individuals and enterprises. Research shows that more than a third of all businesses were victims of ransomware in 2021, and now over a quarter of all malware has been reprovisioned for ransom. Ransomware is the result of malicious attackers compromising a system or network and exfiltrating or encrypting encountered data; victims are then solicited for return of control or access to their data. In many attacks, separate ransoms are demanded for return of the data and for promises not to release that data publicly.

Security

Raising the Bar on Gateway Device Security

Raising the Bar on Gateway Device Security

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

Darshak Thakore
Principal Architect

Mark Walker
Vice President, Technology Policy

Oct 7, 2021

Today, CableLabs® has publicly released a set of best common practices (BCP) to enhance the security of cable modems, integrated access points, and home routers (collectively, known as “gateway devices”) against malicious activity and other cyber threats. This work builds on and extends CableLabs’ and the cable industry’s longstanding leadership in cybersecurity to ensure a consistent and robust baseline for gateway device security, increased economies of scale, and an ontology for simplified communication and procurement between network operators and device manufacturers.

Security

Security for Blockchains and Distributed Ledgers

Security for Blockchains

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

Jan 10, 2019

Empirical evidence reveals an inimical belief that blockchains and distributed ledger technologies (DLTs) are inherently secure because they use cryptography, employ hashing algorithms and have public/private keypairs—in short, a belief that the data in these systems is extremely unlikely to become exposed. After evaluating requirements and deciding to utilize a blockchain solution, security is important to consider from the start.

Security

But it’s Just a Light Bulb, Does it Need All This Security?

Lightbulb security

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

Aug 2, 2018

A version of this blog was published by S&P Global Market Intelligence.

Security

  Device Security in the Internet of Things

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

Oct 27, 2016

Consumer

Giving Up Bad Security Habits

Giving Up Bad Security Habits Brian Scriber

Brian Scriber
Distinguished Technologist and VP of Security & Privacy Technologies

Feb 18, 2016

During the season of Lent in my upbringing meant I was going to be giving something up. This year, instead of giving something up, I have decided to help those around me clean up their security and suggest you help a friend in turn.  Statistics show that you probably know someone who could use a hand modifying their most egregious electronic security habits - maybe we should term it "insecurity habits."  None of us are perfect but these three initial steps will help your friend.