Tag: persistent malware

Who goes there? Why router authentication may be an ISP’s weakest link

Many ISPs underestimate the level of risk to their own backend infrastructure from poorly secured household routers. The growing use of intelligent CPE to deliver data-centric, value-added services to the home in concert with cloud-based servers means that routers are now more tightly coupled to the service provider’s core network than ever before. This blog outlines the dangers to ISP revenue, reputation and quality of service if CPE authentication processes are inadequate. We’ll also look at how ISPs can add a trusted and unclonable identity into each device to safeguard the integrity of their own network and services.

Read More

Protecting routers from ‘the perfect storm’

As routers become more advanced and take a greater role in delivering advanced services, they also become an even more attractive target for bad actors. There should be few things that scare broadband service providers more than their router population becoming infected with persistent malware.
In this blog, we will cover the importance for ISPs to have a trusted and unclonable identity into each CPE in order to safeguard the integrity of their own network and services. Plus we will answer how ISPs can ensure that its CPE suppliers build the right security foundation into the CPE and that their CPE always runs the intended software, and any malicious modification is detected and efficiently remediated.

Read More
Loading