Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Is Anti-Virus Dead?

Each SANSFIRE, the Handlers who can make it to DC get together for a panel discussion on the state of information security. Besides discussion of the hot DNS issue, between most of us there is a large consensus into some of the biggest problems that we face. Two come to mind, the fact that "users will click anything" and that "anti-virus is no longer sufficient". These are actually both related in my mind... more

What Happened to Quantum Networks?

A few years ago, there were a lot of predictions that we'd see broadband networks converting to quantum technology because of the enhanced security. As happens with many new technologies, quantum computing is advancing at a slower pace than the wild predictions that accompanied the launch of the new technology. more

Where Do You Start to Mitigate the Latest Destruction-Motivated Cyber Threats?

With traditional cyber strategies failing businesses and governments daily, and the rise of a new breed of destruction-motivated Poli-Cyber terrorism threatening "Survivability", what are top decision makers to do next? There is a global paradigm change in the cyber and non-cyber threat landscape, and to address it the industry has to offer innovative solutions. more

Will Telesat Survive?

In 2017, Telesat, an established Canadian geostationary satellite operator, announced a planned low-Earth orbit Internet service constellation. The plan called for 117 satellites with inter-satellite laser links in a mix of inclined and polar orbits, enabling global coverage. more

Kill the Spreadsheets! Automate VPN IP Assignments and Tracking over MPLS/VRF and vLAN

Advancements in virtual private networking have extended system capabilities for service providers. Providers can divide LANs into multiple discrete segments using either Virtual Local Area Networks (vLANs), leverage Multiprotocol Label Switching (MPLS) or Virtual Routing and Forwarding (VRF) to host Virtual Private Networks (VPNs) that support service operations over multiple instances. more

ICANN Org’s Multifaceted Response to DNS Abuse

While the March report from ICANN's Domain Abuse Activity Reporting system show a general reduction in second-level gTLD domain names identified as being used in phishing, malware distribution, and botnet command and control, it has been widely reported that criminals are taking advantage of the global COVID-19 pandemic by launching malicious online campaigns. There have also been numerous reports of spikes in the use of COVID-19-related domain names for DNS Abuse. more

Starlink Now Covers All of Australia

My colleague, Robert Smallwood in Geraldton, WA at the Department of Primary Industries and Regional Development (WA Government), has been testing Starlink now since March 2022 and he reports on his experience and in general, provides updates about Starlink and its mother company, SpaceX. He allowed me to use his report to write this article. more

Characterizing the Friction and Incompatibility Between IoC and AI

Many organizations are struggling to overcome key conceptual differences between today's AI-powered threat detection systems and legacy signature detection systems. A key friction area -- in perception and delivery capability -- lies with the inertia of Indicator of Compromise (IoC) sharing; something that is increasingly incompatible with the machine learning approaches incorporated into the new breed of advanced detection products. more

Carrier Hotels: The Unsung Critical Part of Broadband Connectivity

Today's blog talks about a critical part of the broadband network that most people don't know about -- carrier hotels. These are locations that have been created for the specific purpose of allowing carriers to connect to each other. The need for carrier hotels became apparent in the year after the passage of the Telecommunications Act of 1996. That new law allowed local competition for telephone service. more

How COVID-19 is Affecting the Smartphone Industry

At first glance, the COVID-19 pandemic would seem to be great news for tech companies. Depending on which set of statistics you look at, internet usage has spiked by up to seventy percent over the past month as people around the globe are forced to work, socialize, and entertain themselves at home. However, it's not all good news for tech companies. more

TAS Outage Shows Tech Errors Can Happen in Any Organization

Last week, the Internet Corporation for Assigned Names and Numbers (ICANN) was forced to extend the deadline for the new gTLD application to April 20th, after the application system crashed and the technical issue which enabled some applicants to see file names and user names that belonged to other applicants. ... ICANN's decision to extend the deadline is reasonable in the circumstances. more

IANA Transition is Just the Beginning

The transition of the Internet Assigned Numbers Authority (IANA) functions is finally in the history books. After almost two years of working groups and multiple rounds of meetings, most of us want to take a long vacation and never hear the acronym "IANA" again. However, the transition is just the beginning. Now is the time for the multistakeholder community to exercise its new authorities and responsibilities to ensure ICANN remains accountable to every internet user. more

Canadian International Pharmacy Association Celebrates 20 Years on the Internet

The Canadian International Pharmacy Association (CIPA) recently achieved a major milestone: We celebrated our 20-year anniversary, serving millions of customers around the world who otherwise would not afford, access or trust ordering their daily maintenance medications where they live. Founded in 2002 by a group of Canadian pharmacists who recognized the potential of the Internet to provide safe and affordable access to medications... more

The Huawei Issue in the Broader Context of Global Politics

It is very sad to see that Huawei has become a victim of US-China trade war politics and it will be very interesting to see how their court case against the US Government will pan out, the company claims that the ban of its products is "unconstitutional." There is no indication that Huawei has been involved in any spying activity; nor does it appear to have any intention of doing so. more

Rural Broadband Subsidy – What’s the Rush?

The Federal Communications Commission (FCC) has adopted procedures for Phase I of the Rural Digital Opportunity Fund (RDOF) auction, which will award up to $16 billion in support over ten years for the deployment of fixed broadband networks to homes and businesses in census tracks that are unserved by voice and broadband with download speeds of at least 25 Mbps. more

Topics

Threat Intelligence

Sponsored byWhoisXML API

Brand Protection

Sponsored byCSC

IPv4 Markets

Sponsored byIPv4.Global

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days