Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

The Pros and Cons of BYOD (Bring Your Own Device)

At the Virus Bulletin conference this past September in Dallas, Righard Zwienenberg from ESET gave a presentation entitled BYOD. BYOD stands for Bring Your Own Device, but he reframed the acronym to "Bring Your Own Destruction", that is, he alluded to the security implications of bringing your own device. BYOD is the latest trend sweeping business and schools. more

Green Dam is Breached… Now What?

As a number of China hands predicted, the Chinese government has postponed its mandate requiring that all computers sold in China must include the Green Dam -Youth Escort censorware by today. Yesterday after the news broke I told the Financial Times: "There's been this impression in the internet industry that when the Chinese government makes a demand, they have to roll over and play dead. The lesson here is that's not necessarily the case." more

IRMA Threatens Irish ISPs

I don't want to get into the entire Irish Recorded Music Association (IRMA) vs Eircom and IRMA vs ISPs debacle. The only reason I'm even writing this is because I'm getting a bit tired of all the "quotes" of "quotes" and other unclear and misleading things that people have been saying about ISPs over the last few weeks. more

Breaking Down Silos Doesn’t Come Easy

"We need to break down silos", is a phrase often heard in national and international meetings around cyber security and enforcing cyber crime. So it is no coincidence that at the upcoming NLIGF (Netherlands Internet Governance Forum), the IGF, but also an EU driven event like ICT 2013 have "Breaking down silos" and "Building bridges" on the agenda. But what does it mean? And how to do so? more

NORDUnet’s Brilliant Internet Peering Strategy

NORDUnet, the R&E network connecting the Nordic countries has recently undertaken a brilliant Internet peering strategy that will have global significant ramifications for supporting research and education around the world. NORDUnet is now emerging as one of the world's first "GREN"s -- Global Research and Education Network. NORDUnet is extending their network infrastructure to multiple points of presence throughout the USA and Europe to interconnect to major Internet Exchange Points (IXPs). more

Bringing Multistakholderism Home, .US and the Stakeholder Council

2014 will be remembered as the year of the "multistakeholder model" on the Internet. NTIA demonstrated its commitment to bottom-up, multistakeholder Internet governance by committing to complete the transfer of responsibility for various technical functions -- known as the IANA Functions -- to the multistakeholder community. NTIA called on ICANN to convene the community to develop a transition plan to accomplish this goal. more

Telegeography’s Submarine Cable Map Now Lets You Link to Specific Cables or Landing Points

Want to easily show people where a specific submarine cable goes? Or what cables terminate in a particular location? Last year I wrote about Telegeography's cool interactive submarine cable map and how useful it is to understand the submarine cable side of Internet infrastructure. In that article I mentioned how great it would be if you could get a link for a particular cable or location that you could pass along to other people. more

A Bigger Boat: Application Security Outgrows Capacity for CIOs

There is a classic scene in the movie, "Jaws," when Roy Scheider gets a look at the size of the shark circling his fishing vessel and says, "We're going to need a bigger boat." The same case can be made for CIOs dealing today with application security. Hackers from all over the world are circling business and government like great whites looking for vulnerabilities in Internet-facing applications. The growth of applications is great for doing business but they have become chum in the water for predators. more

Last Minute Surge of Opposition to VeriSign .NET Auto Renewal

The current .NET Registry Agreement between ICANN and VeriSign is due to expire on 30 June 2011. On April 11 2011 ICANN posted a proposed draft renewal agreement for public comment. Under the terms of the existing agreement, which contracted a 6 year term starting July 1 2005, renewal is automatic unless VeriSign commits some egregious breach of terms. more

Why Government Investment in Broadband Is Justified Now

Bobbie Johnson, technology correspondent for The Guardian, was kind enough to quote me along with Vint Cerf (nice to be in good company) on the importance of building an online economy and an online government. Vint said: "You know how they say opportunity lies on the edge of chaos? Maybe that's going to be true here too." So far our telecommunications infrastructure has largely been privately built and financed. Why should that change now? It's unusual for government to do anything as well as the private sector. more

Cyber Crime: It’s All About Data (Part 1)

Cyber crime = crime. How do we make police forces understand this and how to get it prioritized? In this series of blogs I am looking into whether aggregating data can change the way cyber crime is approached and prioritized. At a seminar at the IT Security trade fair in Utrecht detective super intendant Charlie McMurdie, head of the cyber crime unit of the London Metropolitan police, said that cyber crime was recently prioritized by the UK government. She also said the following and I'm allowed to quote this... more

IPv6 Inside Everything and Everybody

With the market for connected humans reaching saturation in advanced economies, mobile operators now see connected devices as the next growth opportunity. 'Everything that can benefit from being connected will be connected', according to Ericsson's CTO (source). In the meantime, Intel dreams of embedding processors into everything that can gain something from communicating. more

Can Trump’s Twitter Account be Deleted Under the New EU Hate Speech Code?

On 31 May 2016, The Commission together with Facebook, Twitter, YouTube and Microsoft unveiled a code of conduct that includes a series of commitments to combat the spread of illegal hate speech online in Europe. These IT Companies support the European Commission and EU Member States in the effort to respond to the challenge of ensuring that online platforms do not offer opportunities for illegal online hate speech to spread virally. more

Expansion of Top-Level Domain Names: Why Current Brand Protection Procedures Will Be Impractical

As ICANN introduces new generic top level domains (gTLDs) and separates itself from US oversight, it has the opportunity to distance itself from the taint of cybersquatting, brand abuse, and criminal activity involving domains... To underscore the scope of the issue, consider this research on just 30 top Interbrand-ranked global brands. The most recent MarkMonitor Brandjacking Index found cybersquatting incidents increased over 40% in the last year for the brands that were studied; these leading brands suffered as many as 15,000 incidents per brand... more

2012: The Year of Securing Websites?

In a seemingly never-ending row of news on hacks of websites now the news in which 2.3 million individual cases of privacy sensitive data were accessible through a leak in the websites of most public broadcasting stations in the Netherlands. To make the news more cheerful, the accessible data was, if compiled, sufficient to successfully steal a complete identity. What were thoughts that came to my mind after hearing this news on Friday? more

Topics

Cybersecurity

Sponsored byVerisign

Domain Names

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Threat Intelligence

Sponsored byWhoisXML API

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

New TLDs

Sponsored byRadix

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days