In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more
From the beginning, the Internet has been viewed as something special and "unique." For example, in 1996, a judge called the Internet "a unique and wholly new medium of worldwide human communication." The Internet's perceived novelty has prompted regulators to engage in "Internet exceptionalism," crafting Internet-specific laws that diverge from regulatory precedents in other media. Internet exceptionalism has come in three distinct waves... more
The largest traditional cable providers collectively lost over 1.3 million customers in the fourth quarter of 2020 -- an overall loss of 1.7% of customers. To put the quarter's loss into perspective, the big cable providers lost 14,158 cable customers per day throughout the quarter. The numbers below come from Leichtman Research Group, which compiles these numbers from reports made to investors, except for Cox, which is estimated. more
Now that the search has officially commenced, I thought it might be useful to make some public statements as to what I would like to see from the next ICANN CEO. My comments are driven by what I see as the deficiencies over the last number of years and, most importantly, by a deep desire to see the ICANN experiment in global governance succeed. The Internet is the greatest agent for positive change the world has ever seen and a healthy ICANN strengthens its ability to foster positive change. more
Facebook has announced its Libra cryptocurrency. This is good news for cryptocurrencies and market-incentivized networks. I worry that Libra's financial inclusion might come with an attendent loss of privacy or autonomy. After months of speculation, Facebook on Tuesday announced Libra, a cryptocurrency with the mission of enabling a simple global currency and financial infrastructure that empowers billions of people. more
Mail software consists of a large number of cooperating pieces, described in RFC 5598. A user composes a message with a Mail User Agent (MUA), which passes it to a Mail Submission Agent (MSA), which in turn usually passes it to a sequence of Mail Transfer Agents (MTAs), which eventually hand it to a Mail Delivery Agent (MDA) to place it in the user's mail store. If the recipient user doesn't read mail on the same computer with the mail store (as is usually the case these days) POP or IMAP transfers the mail to the recipient's MUA. more
The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more
We're in an interregnum where society has paused, and there's no telling how things may turn. In such times of crisis, we are the explorer; exploring the uncharted waters of change, where dangers and opportunities lie. How the pandemic caused this greater societal change may not be something that an individual can alter, we may, however, take the helm and navigate. more
There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more
Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more
Some worrying signs are emerging in the USA. During the last decade I have questioned the economic viability of two parallel telecoms infrastructures. When these two network rollouts commenced no issue existed in relation to conflicting interests -- one delivered telephone services, the other broadcasting services. But this all began to change when it became possible to use the HFC network more
As the Internet grows, those countries and societies with mature systems of content development, innovation and entrepreneurism will continue to be better positioned to meet these needs. At the same time, such countries are also better positioned to take advantage of the efficiency, and capacity of the Internet to amplify and extend their cultural reach and economic capacity. The implication of this amplification and extension of cultural reach and economic capacity from developed markets, is that it can drown out indigenous content and restrict local economic opportunities in developing and under-developed markets. more
The ICANN Implementation Recommendation Team (IRT) working group has published its final report, which I decided to analyze a bit further. I already made a few comments last month, both in the At-Large Advisory Council framework and on my own. There are several issues raised by the recommendations of this report. The Uniform Rapid Suspension system (URS) is one. more
As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more
I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out Vulnerable Firms. It's a story of a small business owner in New York whose company was broken into by cyber criminals and stole $1.2 million from its bank accounts, although the owner was able to later recover about $800,000 of that. The moral of the story is that small businesses feel like they are not a major target for online thefts like these. more
Sponsored byDNIB.com
Sponsored byIPv4.Global
Sponsored byCSC
Sponsored byVerisign
Sponsored byVerisign
Sponsored byWhoisXML API
Sponsored byRadix