Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

3 DNSSEC Sessions Happening At ICANN 50 Next Week in London

As I mentioned in a post to the Deploy360 blog today, there are three excellent sessions relating to DNSSEC happening at ICANN 50 in London next week: DNSSEC For Everybody: A Beginner's Guide; DNSSEC Implementers Gathering; DNSSEC Workshop. Find out more. more

Password Leaks

The technical press is full of reports about the leak of a hashed password file from LinkedIn. Worse yet, we hear, the hashes weren't salted. The situation is probably both better and worse than it would appear; in any event, it's more complicated. more

Internet Is Transforming Governments and Politics

All round the world we are seeing massive social changes in the way people interact with their leaders and with their political elite. In many cases governments and politicians seem to be behaving as though they are immune to the changes that are following on from these new grassroots-based democratic processes. They often do mention reforms and recommend reforms, but there is an equal need for them to transform their own sector and their own way of conducting politics and government. This applies to both the political leaders in developed and the developing economies. more

Downloading is Not Enough… Probably

Peer to peer download services are still popular with music-loving kids, it seems. The second annual survey of young people's music consumption by pressure group UK Music found that three-fifths of the 1,808 18-24 year olds who took part said they used p2p services, and four-fifths of those did so at least once a week. This is almost the same as last year's result, and would seem to indicate that the efforts by the music industry to offer a range of licensed alternatives to Limewire and other p2p services have failed to have any real impact. more

At the Start of the NL IGF

At the annual Dutch "delegation" dinner at the Internet Governance Forum (IGF) in Vilnius, Lithuania, I voiced that it may be a good idea to start a Dutch IGF. This followed a discussion in which we discussed the possibilities of involving more people and organisations from the Netherlands in Internet governance. The, now, Ministry of Economic Affairs, Agriculture and Innovation followed this thought and made it possible for the ECP/EPN foundation to start the NL IGF. more

Net Neutrality? Give Me a Break

As my learned friend John Levine has noted, rightly, any policy that anyone has come up with thus far regarding net neutrality is based upon a Telco model. Now, think about that for a second. A telephone call costs pretty much the same if you whisper or shout. It costs the same if you make a quick phone-call or you yack for hours. These days, even long distance is trivially inexpensive, because the capacity to carry the world's phone-calls is well beyond any foreseeable demand. There is huge headroom. more

The Role of FttH in the Development of 5G

As the roll out of FttH remains a slow process, it is no wonder that more and more people are looking towards mobile as a potential alternative. Obviously, mobile communication has improved over recent years in providing excellent access to broadband; and it has also become more affordable. At the same time, there is the fabulous hype about 5G, and the PR and media machines of the vendors involved make you believe that this will become a real competitor to the slow moving FttH developments. more

M3AAWG & i2Coalition Collaborate on Best Practices on Anti-Abuse in Hosting & Cloud Environments

I am excited to announce the recent release of the industry first Best Common Practices document for Cloud and Hosting providers for addressing abuse issues that was created by M3AAWG and the i2Coalition. M3AAWG has been collaborating with the Best Practices Working Group of the i2Coalition over the past 2 years to discuss ways to solve malicious activity within hosting and cloud ecosystems.  more

Wow, a U.S. Ministry of 5G

This seemed to be the reaction this morning worldwide to the leaked alleged PowerPoint slides detailing the White House strategic options for a U.S. national 5G infrastructure. The gist of the slides has apparently been confirmed to Reuters by unnamed "Trump security team members." The options apparently range between creating a U.S. Ministry of 5G resembling the old world of government Post, Telegraph and Telecommunication (PTT) agencies of bygone years, and sawing off the U.S. ICT infrastructures and services from the rest of the world. more

When Cyber Awareness Is Fundamentally Lacking

"Smartphones (and tablets, WdN) are invading the battlefield", reports the Economist on its website of 8 October 2011. On the same day the hacking of U.S. drones is reported on by several news sites. ("They appear friendly". Keyloggers???) Is this a coincidence? more

America Planning for the Closure of Its Copper Network

In an interesting move the FCC's Technical Advisory Council has outlined the need for setting a 'sunset' date for the closure of the circuit switched network. This is a first step that eventually could lead to the replacement of the PSTN in the USA, rather than letting the network slowly fade into oblivion the FCC proposes the bring the issue in the open so that it can be properly evaluated and discussed. more

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

Why Passwords Have Never Been Weaker and Crackers Have Never Been Stronger

The past few weeks, I've been on this security kick particularly when it comes to encryption. I'm developing my own app in my spare time. So I'm trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am protecting is only quasi-valuable so I can afford to take a hit due to my own conscious incompetence. Anyhow, I ran across this article on Ars Technica yesterday entitled "Why Passwords have never been weaker - and crackers have never been stronger." It's a long article and it will take you a while to read it, but here is my summary. more

Peering and Interconnection Key to a Competitive American Telecoms Market

Peering has come back in the news with the FCC mentioning it in its set of reviews of the telecommunications market in the USA, following its Network Neutrality decision. The peering and interconnect issues are going to the heart of the telecoms matter in relation to competition, innovation and the Open Network. You don't need Network Neutrality rules, if you have a well functioning, transparent, interoperable and competitive infrastructure environment. more

The Importance of IPRC in Asia Pacific

I believe and strongly support Internet Principle and Right Coalition (IPRC) Charter is an important edition of document supplementing the principles and rights of individual internet users in any developing and least developed country. Especially in Asia Pacific region where the need and use of such document is immense, as there is a gap in recognition and awareness of rights of internet users. more

Topics

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

Domain Names

Sponsored byVerisign

Threat Intelligence

Sponsored byWhoisXML API

New TLDs

Sponsored byRadix

IPv4 Markets

Sponsored byIPv4.Global

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days