<h1>Ettore Benedetti</h1>

Ettore Benedetti

Ettore is Product Manager and cybersecurity expert at Irdeto. He is responsible for building the identity and key management solutions that major manufacturers and communication service providers trust for protecting their investments in services, networks and, devices at scale. Ettore holds six patents in the area of embedded security solutions. Prior to Irdeto, Ettore worked at Thales on survivable networks for the battlefield and obtained a Master of Science degree in Electrical Engineering at the University of Padua (Italy) and the University of Essex (UK).
Who goes there? Why router authentication may be an ISP’s weakest link

Who goes there? Why router authentication may be an ISP’s weakest link

Many ISPs underestimate the level of risk to their own backend infrastructure from poorly secured household routers. The growing use of intelligent CPE to deliver data-centric, value-added services to the home in concert with cloud-based servers means that routers are now more tightly coupled to the service provider’s core network than ever before. This blog outlines the dangers to ISP revenue, reputation and quality of service if CPE authentication processes are inadequate. We’ll also look at how ISPs can add a trusted and unclonable identity into each device to safeguard the integrity of their own network and services.

Protecting routers from ‘the perfect storm’

Protecting routers from ‘the perfect storm’

As routers become more advanced and take a greater role in delivering advanced services, they also become an even more attractive target for bad actors. There should be few things that scare broadband service providers more than their router population becoming infected with persistent malware.
In this blog, we will cover the importance for ISPs to have a trusted and unclonable identity into each CPE in order to safeguard the integrity of their own network and services. Plus we will answer how ISPs can ensure that its CPE suppliers build the right security foundation into the CPE and that their CPE always runs the intended software, and any malicious modification is detected and efficiently remediated.

Reimagining the router: Friend or foe?

Reimagining the router: Friend or foe?

With the number of Wi-Fi enabled devices in each household rising, the ISP-provided WiFI modem (or Customer Premises Equipment, CPE) stops being the humble little box that enables broadband access for their subscribers. But if ISPs are to succeed with their connected home strategy, the CPE needs to be future-proof to be able to support a range of new and future services, and it has to address the growing threat of cybercriminals looking to breach both their subscribers’ home devices and their own infrastructure.
What mechanisms are available today? How can ISPs ensure securing the CPE is done correctly?