13 04, 2015
  • Get Your Tech On

DOCSIS Internet Security – internet security and recommended best practices Episode 11

2021-08-17T09:01:26-04:00April 13th, 2015|

DOCSIS Internet Security Episode 11 Brady Volpe was joined by John Downey, Dan Hegglin and Brian Wilson discussing the challenges cable operators face with DOCSIS internet security and recommended best practices they can follow to secure their networks from DDoS, DoS, DNS, High Value Targets and many more. More about Dan Hegglin of Cisco and Brain Wilson of Alcatel-Lucent Brian has been in the IT Security & Cable industry for just at 20 years. He started his career in the US Army in the Signal Corps and has worked since with many

26 11, 2012
  • openDNS

OpenDNS | Security at the Network Level

2012-11-26T13:16:13-05:00November 26th, 2012|

With a lot of adult content and other nefarious sites all over cyber space, it is paramount to protect your family from as appropriate. This can be done by filtering content coming into your computer. There are fundamentally two ways to successfully block adult and other malicious contents from gaining entry into your computer and your home. The first is by installing software designed to block such contents from your PC. The second way can be done at the network level. This later method does not involve the

23 11, 2011
  • Intraway DOCSIS Security and Fraud Detection

Fresh Tech | Intraway Secures DOCSIS

2020-07-02T16:34:58-04:00November 23rd, 2011|

I first heard of Intraway's products through a LinkedIn request to talk about DOCSIS security from Intraway's CEO, Leandro Rzezak. This immediately peaked my interest becuase today our DOCSIS networks are inherently insecure and many are unaware of this. What do I mean by insecure? No, not crying and sniffling in a corner. They are open to theft of service, illegal intercept of the data transmitted, illegal wiretapping of phone calls, etc. Even with Baseline Privacy Interface Specification (BPI+) DOCSIS is quite hackable as evidenced on a number of well known hacking sites. The cool factor in the Fraud & Network Usage Control module offered by Intraway is that they have developed effective algorithms which sit on-top of the most used provisioning systems, Cisco's CNR and Incognito's BCC.

Go to Top