In 1946 Winston Churchill declared that Russia had lowered an iron curtain across Europe, and in 2022 Vladimir Putin created an iron firewall between the Russian Internet and media and the rest of the world, but, like its precursor, it is porous. Information wants to be free. more
As a long-established online attack strategy, phishing remains a popular tool for fraudsters because of its effectiveness. The Anti-Phishing Working Group reported more than 300,000 distinct phishing attacks in December 2021 -- more than three times the number reported in early 2020, and the highest monthly total ever identified. more
Quantum computers are coming, and the American Bar Association's SciTech section is beginning to consider the legal implications. This raises the question, will the legal profession be able to adopt emerging quantum technologies on a tech-business as a usual basis? Or will the developments flowing from quantum mechanical theory present a categorical challenge to the legal-industrial complex? more
When talking about the benefits of broadband, it's easy to overlook how broadband has become the glue that brings people and communities together. This is becoming particularly important for rural communities but matters to people everywhere. Rural communities have been rapidly losing other forms of media that were the focal point in the past. 2004 was the peak of the newspaper business in terms of readership and revenues. more
On Monday May 23 2022 at 3 -- 5pm EEST (12:00 -- 14:00 UTC) the Finnish Internet Forum will convene a panel at the University of Helsinki with the topic 'Internet and War'. A panel of experts will address the question of how the war has affected the Internet and how the Internet has been used to influence Finland and elsewhere during the war. The event will be conducted in English. more
The approval on 13 May by the European Council and Parliament of a near-final draft Directive on European Cybersecurity (NIS2) brings the world's most far-reaching cyber regime closer to realization. What is generally unknown, however, is the broad scope and global extraterritorial jurisdiction reach of the Directive. It applies to almost every online service and network capability that exists as infrastructure or "offered" anywhere in Europe. more
There was a recent article in FierceTelecom that quotes a leading cable company consultant as saying that cable companies are not likely to universally upgrade broadband networks in the future. The consultant is Sean McDevitt, a partner at Arthur D. Little, a consulting firm that largely works for the giant ISPs. In the past, when a cable company migrated from DOCSIS 1.0 to 2.0 and to 3.0, everybody in a community was upgraded to the latest technology. more
Recent Department of Defense IPv4 activity and announcements about IPv6 indicate a shift in their perspective and suggest potential impacts on the IPv4 address market. The shift could include the release of up to 175 million IPv4 addresses in the coming years, creating a risk of a glut in the market. For perspective, the market has transferred 380 million addresses over eleven years. more
Russians have targeted Ukrainian electricity and communication infrastructure. In some areas, there may not be any utility poles left standing, and underground conduits may have been bombed to oblivion. Starlink has been an important tool for these brave people to coordinate their resistance to Putin's brutal invasion. Satellite communication doesn't require any middle-mile infrastructure. more
We've all heard the term, "you're only as strong as your weakest link." Whether talking about a tug of war on the playground, a sports team, or a business, this rings as true as ever. Every business relies on a series of suppliers and vendors -- be it the dairy farm supplying milk to the multinational food manufacturer or the payment systems that retailers use. These links form supply chains that every business, large and small, deals with. There is simply no way around it. more
Two recent celebrated cybersecurity standards history events brought together sets of people who were intimately involved with some of the most significant network security standards work ever undertaken. These included the X.509 digital certificate standards at ITU X.509 Day, and the Secure Digital Network System (SDNS) standards at the NSA Cryptologic History Symposium 2022. more
On May 12th, European legislators head into their final trilogue negotiations around the NIS2 Directive. This week, the Internet Infrastructure Coalition (i2Coalition) shared guidance found below with negotiators, focused on the Directive's Article 23. i2Coalition has been detailing our concerns about Article 23 before even their public consultation in March 2021. more
Universal Acceptance (UA) is a fundamental requirement for a truly multilingual and digitally inclusive Internet. UA is important because it ensures that all domain names, including new long top-level domains (TLDs) and Internationalized Domain Names (IDNs), and email addresses are treated equally and can be used by all Internet-enabled applications, devices, and systems. more
Counterfeiting is big business. A 2021 study by the Organisation for Economic Cooperation and Development (OECD) estimated that the international trade in counterfeit and pirated products was worth up to $464 billion in 2019, or around 2.5% of all world trade. A significant proportion of this trade occurs via digital channels, where global annual expenditure on eCommerce is more than $4 trillion. more
I'm not sure that most people understand the extent to which our online experience has moved to the cloud -- and this movement to the cloud means we're using a lot more bandwidth than in the recent past. A huge number of online functions now reside in the cloud, when only a few years ago, a lot of processing was done on our computers. Take the example of Twitter, where I keep an account to upload a copy of my blog every day. more
Sponsored byWhoisXML API
Sponsored byRadix
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byVerisign
Sponsored byIPv4.Global
Sponsored byCSC