Security

image

Device Security in the Internet of Things

October 27, 2016

As of the writing, some of the largest distributed denial-of-service (DDoS) attacks ever are actively disrupting major service and content providers. Many of the attacks are being reported as leveraging Internet of Things devices such as IP cameras. It’s interesting that these dramatic attacks are happening during Cybersecurity Awareness month. How to Affect Change In […]

Read More
image

Adversarial Engineering

July 13, 2016

Security engineering is one of few technical endeavors in which you deal with an adversary. There are a few other domains such as electronic warfare or fire prevention. Working against an adversary in this way is like playing a twisted game of chess. As the game begins, the security engineer is aware of most of […]

Read More
image

The Future of Network Security

May 24, 2016

I recently attended a panel discussion that considered technology evolution over the next thirty years. Of course, predicting such long term evolution and revolution is daunting. However, it’s interesting that all three panelists chose first to look to the mid 1980s to provide guidance to forecast the mid 2040s. As a forward-looking security engineer, looking […]

Read More
image

Hello Blockchain . . . Goodbye Lawyers?

April 19, 2016

As the blockchain technology star begins to eclipse Bitcoin and the other cryptocurrencies that rely upon it, there has been an increase in research and development into using blockchain for “smart contracts.” Smart contracts are computer programs that facilitate, verify, execute, and enforce a contract. While smart contracts have existed to a limited extent for […]

Read More
image

Blockchains and the Cable Industry

March 1, 2016

Blockchain is the fundamental technology underlying digital currencies and new transaction processing solutions. Some technologists are generalizing the concept now and using the term distributed ledger technology, or DLT. Blockchain technology uses cipher-chaining to cryptographically link blocks of transactions. The most famous implementation of this approach is Bitcoin. Over the last couple years new trends […]

Read More
image

Giving Up Bad Security Habits

February 18, 2016

During the season of Lent in my upbringing meant I was going to be giving something up. This year, instead of giving something up, I have decided to help those around me clean up their security and suggest you help a friend in turn.  Statistics show that you probably know someone who could use a […]

Read More
image

A Cybersecurity Framework for the Nation’s Critical Infrastructure: How CableLabs is Helping

March 26, 2014

Over the past year there has been a significant increase in the number and frequency of cyber-attacks on major retailers, social media sites, and financial institutions.  From identity theft and credit card fraud to denial of service, these cyber criminals are starting to disrupt our lives in small but troubling ways.  What happens when those […]

Read More