In the wake of recent high-profile security incidents, I started wondering: what, generally speaking, should an organization's security priorities be? That is, given a finite budget - and everyone's budget is finite - what should you do first? More precisely, what security practices or features will give you the most protection per zorkmid? I suggested two of my own, and then asked my infosec-heavy Twitter feed for suggestions. more
Like much of how the Internet is governed, the way we detect and remove child abuse material online began as an ad hoc set of private practices. In 1996, an early online child protection society posted to the Usenet newsgroup alt.binaries.pictures.erotica.children (yes, such a thing really existed) to try to discourage people from posting such "erotica" on the assumption that the Internet couldn't be censored. more
A recent survey conducted by the Neustar International Security Council confirmed the heightened interests on domain name system (DNS) security. The survey reveals that over three-quarters of cybersecurity professionals anticipate increases in DNS attacks, especially with more people shopping online amid the pandemic. Yet, close to 30% have reservations about their ability to respond to these attacks. more
The International Trademark Association's Blockchain Subcommittee is interested in meeting companies working on Blockchain applications related to intellectual property. The Blockchain Subcommittee's mission is to explore the use of blockchain technology in trademark prosecution, maintenance, protection, and practice, including the opportunities and threats to the value of trademarks, brands, and consumer trust in emerging blockchain technologies. more
Last September, I asked what had happened to the proposal for a branch connecting the ARCOS undersea cable, which has a landing point in North Miami Beach, to Cojimar, Cuba. The consortium that operates the cable had applied for permission to connect Cuba in July 2018, and the FCC granted a request for streamlined processing, which should have taken less than 45 days, but nothing happened until September 2020 when the application was referred to a Justice Department committee... more
As the pandemic continues, the network operator community continues to meet online. NANOG held its 81st meeting on February 8 and 9, and these are my notes from some of the presentations at that meeting... Ethernet, developed in 1973 at Xerox PARC, was a revolutionary step in network architectures in many ways. The common bus architecture imposed several constraints on the network that have echoed through the ensuing four decades in all kinds of ways. more
After some turmoil, Facebook won the war with the Australian Government as the necessary changes were made to the legislation that avoided them needing to change their business model. Those subtleties are lost in the general press. What counts for the popular media is that they were able to spin some great stories around the fact that Australia stood up to the giants. That brought international attention, which boosted the ego of Australian Prime Minister Scott Morrison. more
When a brand goes so far as to ask a domain name registrar for Whois (the registration contact details) of a potentially abusive domain name, there's likely a lot at stake. Most often, the request is prompted by consumer safety concerns, such as the risk to consumers posed by a malicious site. Other times, the demand has a simple goal: to have a dialog with the registrant about the use of trademarks or other intellectual property in order to avoid extreme action. more
President Biden recently signed an executive order that will require that the federal government buys more goods produced in the United States. This was done to promote American jobs and to keep profits at home. It's a great idea, but it suffers from one big flaw -- we don't manufacture a lot of things in the US anymore. Statistics are hard to pin down, but something like 40,000 US factories have shut down over the last decade. more
A few months ago, I reported on the broader market of which telecommunications infrastructure is a part. I mentioned data centers, cloud computing and data analytics (big data). All together, we can perhaps best call this digital infrastructure. While the importance of this merged set of infrastructures will benefit all economies and societies, I recently focused on regional developments as basically every region and every mid-size town will need to have a digital hub for local computing workloads and storage. more
As mentioned in previous analyses, the way that the Government has approached its battle with the digital giants has been flawed from the beginning. True, its tough stand had made Google pay media companies well above what these companies would have been able to negotiate individually with Google, but the fundamentals of why these battles are taking place are still unchanged. more
The Secondary Market in domain names plays a critical role in Internet commerce yet is often misunderstood. This article will attempt to clear up some of the myths that frequently arise when discussing the Secondary Market... Domain name investors are but one group participating in the thriving domain name Secondary Market, in which already registered domain names move from one owner to another. more
Over the last few years, it's become clear that abuse of the Domain Name System -- whether in the form of malware, botnets, phishing, pharming, or spam -- threatens to undermine trust in the Internet. At Public Interest Registry, we believe that every new .ORG makes the world a better place. That means anything that gets in the way of that is a threat, and that includes DNS Abuse. more
Beta testers in the US and Canada paid $500 for a terminal and are paying $99 per month for the service. The beta tests began in high-income countries, but SpaceX is beginning to roll Starlink out and will include low-income nations, for example, India. Last September, SpaceX responded to a request for consultation on a roadmap to promote broadband connectivity and enhanced broadband speed from TRAI, the Telecommunications Regulatory Authority of India. more
One of the consequences of the Jan 6th events is a renewed attention towards Surveillance Capitalism as a key doctrine undermining democracy.2 This part 2 of the 2 part series of discusses the rise and fall of Surveillance Capitalism under the premise that the better we understand the danger at the door, the better we are able to confront it. more
Sponsored byRadix
Sponsored byIPv4.Global
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byCSC
Sponsored byVerisign
Sponsored byDNIB.com