Blog

There are 7 blogs written by Andy Dolan.

image

Addressing Emerging Cryptographic Threats in the Age of Quantum Computing

October 13, 2025

Cryptography is a foundational security technology used to protect digital information by providing the underpinnings for confidentiality, authentication and integrity. Today’s cryptographic algorithms may soon be undermined by emerging attacks, including the realization of a cryptographically relevant quantum computer (CRQC). Such attacks pose a very real and increasingly urgent threat across virtually all industries and […]

Read More
image

Hacker Summer Camp 2025 Debrief: AI and the New Threat Landscape

September 16, 2025

Last month’s Hacker Summer Camp brought together hackers, researchers, practitioners and leaders in cybersecurity to review the cutting edge of security research, share tools and techniques, and find out what’s at the front of everyone’s mind in the security space. So, what was at the forefront of the conversation this year in Las Vegas, and […]

Read More
image

Tangled Web: Navigating Security and Privacy Risks of Overlay Networks

December 20, 2024

Residential proxies and decentralized physical infrastructure networks (DePINs) are technologies that enable end users to participate in semi-anonymous communications similar in function to virtual private networks (VPNs) by essentially sharing their broadband connection with anonymous third-party users. These types of networks are not new, but they have become more popular, easier to set up (sometimes […]

Read More
image

Empowering the Future of Network Services Through a Federated NaaS Platform

December 10, 2024

In a world that increasingly depends on digital connections, network as a service (NaaS) has emerged as a game-changing technology. By making network functionalities available as on-demand services across the ecosystem, NaaS empowers developers to build applications that dynamically leverage network resources without needing deep knowledge of the underlying infrastructure. However, as powerful as NaaS […]

Read More
image

Black Hat USA and DEF CON: A Lot to Unpack After “Hacker Summer Camp”

September 10, 2024

This year has been a particularly interesting one for cybersecurity. Notable incidents and other areas of focus in cybersecurity set the backdrop for “Hacker Summer Camp 2024” in Las Vegas in August. Topics frequently alluded to during this year’s conferences included: Increased focus on critical infrastructure — Critical infrastructure is increasingly complex, distributed and difficult […]

Read More
image

CableLabs Co-Chairs New M3AAWG AI Committee

February 15, 2024

The sudden rise of highly capable artificial intelligence (AI) has brought immense opportunities for beneficial innovation and advancement. However, alongside its benefits, AI also presents unique challenges concerning online abuse and threats to security and privacy. Recognizing the urgency of addressing these issues, the Messaging, Malware, and Mobile Anti-Abuse Working Group (M3AAWG) has taken a […]

Read More
image

Maintaining Confidentiality in the 10G Network

August 4, 2020

The 10G platform will offer almost limitless opportunities for innovation and new experiences in the home, bolstering the capabilities of the Internet of Things (IoT) landscape. While the volume of data that passes over cable technologies continues to grow, the classification of private and confidential boundaries continues to change. Moreover, security is an abstract topic, […]

Read More