Featured Blogs

Latest

WannaCry: Patching Dilemma from the Other Side

WannaCry, originated firstly in state projects but spread by other actors, has touched upon myriads of infrastructure such as hospitals, telecommunication, railroads that many countries have labelled as critical. IT engineers are hastily presenting patching codes in various localized versions. The other patch needed, however, is more than technical. It is normative and legislative. The coding of that patch for a situation like this is in two layers of dilemma. more

The 2-Character Answer to this GAC Advice Should be “No”

ICANN's Governmental Advisory Committee (GAC) has reacted to the ICANN Board's November 2016 decision to authorize the release of two-character domains at new gTLDs with advice to the Board that does not have true consensus backing from GAC members and that relates to procedure, not policy. The Board's proper response should be to just say no, stick to its decision and advise the GAC that it will not consider such advice. more

It’s Up to Each of Us: Why I WannaCry for Collaboration

WannaCry, or WannaCrypt, is one of the many names of the piece of ransomware that impacted the Internet last week, and will likely continue to make the rounds this week. There are a number of takeaways and lessons to learn from the far-reaching attack that we witnessed. Let me tie those to voluntary cooperation and collaboration which together represent the foundation for the Internet's development. more

How Aruba is Using Racing Sponsorship to Make Itself a Premium Brand

Sitting in the Aruba hospitality at the Italian round of the Superbike World Championship in Imola, CEO Stefano Cecconi exudes passion. The love he has for motorcycles in general, and racing in particular, is evident. Less so is the rational behind Aruba's multi-million-euro-a-year spend to be the title sponsor for the factory Ducati World Superbike team. For Internet industry onlookers at least. more

The Criminals Behind WannaCry

359,000 computers infected, dozens of nations affected world-wide! A worm exploiting a Windows OS vulnerability that looks to the network for more computers to infect! This is the most pernicious, evil, dangerous attack, ever... Queue the gnashing of teeth and hand-wringing! Wait, what? WannaCry isn't unprecedented! Why would any professional in the field think so? I'm talking about Code Red, and it happened in July, 2001. more

Why Not Connect Cuba’s Gaspar Social Streetnet to the Internet?

I've been covering Cuban streetnets (local area networks with independent users that are not connected to the Internet) for some time. Reader Doug Madory told me about Gaspar Social, a new streetnet in Gaspar, a small town in central Cuba. Gaspar Social opened to the public last October and has grown quickly -- about 500 of Gaspar's 7,500 residents are now users. Streetnets are illegal in Cuba and the government has ignored some and cracked down on others... more

8 Reasons Why Cybersecurity Strategy and Business Operations are Inseparable

In modern society, there is one fact that is unquestionable: The hyper-connectivity of the digital economy is inescapable. A financial institution without an online presence or omni-channel strategy will cease to be competitive. Universities (for-profit or non-profit) must develop and continuously evolve their online learning capabilities if they are to stay relevant. Online retailers are quickly outpacing and rendering their 'brick-and-mortar' counterparts irrelevant. more

Patching is Hard

There are many news reports of a ransomware worm. Much of the National Health Service in the UK has been hit; so has FedEx. The patch for the flaw exploited by this malware has been out for a while, but many companies haven't installed it. Naturally, this has prompted a lot of victim-blaming: they should have patched their systems. Yes, they should have, but many didn't. Why not? Because patching is very hard and very risk, and the more complex your systems are, the harder and riskier it is. more

Telecoms Competition on a Downhill Slide in America

That is what happens when you base your telecommunications policies on the wrong foundations. The problems with the telecommunications industry in America go back to 1996 when the FCC decided that broadband in America should be classified as internet (being content) and that therefore it would not fall under the normal telecommunication regulations. Suddenly what are known as telecommunications common carriers in other parts of the world became ISPs in the USA. How odd is that? more

Trying to Predict Miguel Diaz-Canel’s Internet Policy

I recently gave a short talk that concluded with some speculation on the attitude of Miguel Diaz-Canel, who is expected to replace Raúl Castro next year, toward the Internet. I searched online and came up with three clues -- two talks he has given and one act. In May 2013, Diaz-Canel gave a speech at an educator's conference in which he anticipated today's preoccupation with fake news. He acknowledged the futility of trying to control information. more

Would You Like Your Private Information to be Available on a VHS or Betamax Tape?

When I was a young child growing up in the late 1980s, my parents were lucky enough to be able to afford to have both a VHS-tape video-recorder in the living room and a Betamax tape recorder in their bedroom. This effectively meant that to me, the great video format wars weren't a decade-defining clash of technologies, but rather they consisted mainly of answering the question "in which room can I watch my favorite cartoons?". more

In Response to Offensive Destruction of Attack Assets

It is certainly true that DDoS and hacking are on the rise; there have been a number of critical hacks in the last few years, including apparent attempts to alter the outcome of elections. The reaction has been a rising tide of fear, and an ever increasing desire to "do something." The something that seems to be emerging is, however, not necessarily the best possible "something." Specifically, governments are now talking about attempting to "wipe out" the equipment used in attacks. more

Digital Identity and Branding: The Five Most Common Mistakes in Naming

The U.S. is a total hotbed for Startups. Over the course of the last year, venture capital firms invested $69.11 billion in U.S. startups. Now is an exciting time where there is more ingenuity and entrepreneurial efforts than ever before. And of course every entrepreneur's dream is to have a successful idea and "make it". However, a startup's name and its associated digital identity are often not as thought out as they should be. more

IoT Devices Will Never Be Secure - Enter the Programmable Networks

Harvard Business Review just ran an interesting article on the information security aspects of Internet of Things (IoT). Based on the storyline, the smart city initiatives are doomed to fail unless the security of the IoT devices and the systems will be improved. While security of the digital society is obviously a key concern, I am not entirely convinced that relying on the security of individual devices and systems is the best course of action. more

The Role of FttH in the Development of 5G

As the roll out of FttH remains a slow process, it is no wonder that more and more people are looking towards mobile as a potential alternative. Obviously, mobile communication has improved over recent years in providing excellent access to broadband; and it has also become more affordable. At the same time, there is the fabulous hype about 5G, and the PR and media machines of the vendors involved make you believe that this will become a real competitor to the slow moving FttH developments. more

Topics

DNS

Sponsored byDNIB.com

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

Cybersecurity

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days

Most Viewed – Last 30 Days