Each SANSFIRE, the Handlers who can make it to DC get together for a panel discussion on the state of information security. Besides discussion of the hot DNS issue, between most of us there is a large consensus into some of the biggest problems that we face. Two come to mind, the fact that "users will click anything" and that "anti-virus is no longer sufficient". These are actually both related in my mind... more
The 24th DNS-OARC meeting was held last week in Buenos Aires -- a two-day DNS workshop with amazingly good, consistent content. The programme committee are to be congratulated on maintaining a high quality of presentations. Here are my picks of the workshop. They fall into three groups, covering themes I found interesting... These presentations related to the ongoing problem of DNS as a source of reflection attacks, or a victim of attempted DDoS... more
It's been a while since I checked in to see how the U.S. is doing in the 5G race. I haven't been following the issue since before the pandemic when the U.S. government was tossing around the idea of buying a controlling interest in Nokia or Ericsson. That idea went nowhere but led to a lot of articles in the business press. I decided to look anew after seeing recently that the FCC is estimating that it would cost U.S. carriers about $1.8 billion to replace Huawei and ZTE gear in U.S. more
At the start of the year, many responsible for managing domain name portfolios may be considering spring cleaning! Traditionally, such a task consists of a review to check that all domains in the portfolio serve a purpose either from a commercial or defensive perspective. The aim is to ensure budget isn't wasted on domains of little to no value. It's fair to say that for many organizations, this is a difficult process - almost as feared as actually spring cleaning our own homes. more
Think your organization is exempt from in-house network abuse? Think again. A CFCA Global Fraud Survey of communication service providers found that dealer fraud was one of the top five methods of fraud, costing $US 3.35 billion annually. In this scenario, customer service representatives (CSRs) or administrators with access to account information may upgrade friends or family to a premium service package or even provide free access to services. more
For the first time in my career, we face the possibility of some big changes for broadband in low-income neighborhoods in cities. The recent American Rescue Plan Act (ARPA) gave cities significant funding that can be used for various kinds of infrastructure, including broadband. Cities have been handed a once-in-a-lifetime chance to fix some of the broadband deserts that have grown in poor neighborhoods. I'm already working with several cities that are taking this opportunity seriously. more
Om has burnt the midnight oil analyzing Vonage's S-1 filing, coming to the conclusion that, while churn may not be as ugly as people thought, it's still cause for concern, and apparently intensifying. His point at the end about definitions is particularly good, as excluding cancellations in the first 30-days is undoubtedly flattering to the numbers. The net present value of Vonage's lifetime customer revenues is an issue which VoIP-watchers have long speculated about with trepidation -- what if marketing spending, churn, and price competition combined to form a toxic soup which fatally poisoned the economic proposition for access-independent VoIP? more
Many organizations today are tightening their belts. They have smaller budgets and fewer resources even though they face an ever-growing list of projects, tasks and corporate IT initiatives to complete. IT departments are hard pressed to streamline operations but don't necessarily have the manpower -- be it resources or specific skillsets -- to add capabilities that will achieve such efficiency. There are only a few possible solutions organizations can consider to address this common problem... more
In part three of this series of posts looking at emerging internet content relating to coronavirus, we turn our attention to mobile apps - another digital content channel that can be used by criminals to take advantage of people's fears about the health emergency for their own gain.One of the most common attack vectors we have found in our analysis is the use of apps purporting to track global progression of COVID-19, or provide other information, but which instead incorporate malicious content. more
Advancements in virtual private networking have extended system capabilities for service providers. Providers can divide LANs into multiple discrete segments using either Virtual Local Area Networks (vLANs), leverage Multiprotocol Label Switching (MPLS) or Virtual Routing and Forwarding (VRF) to host Virtual Private Networks (VPNs) that support service operations over multiple instances. more
A lot of rural areas are going to get fiber over the next five years. This is due to the various large federal grant programs like ReConnect and RDOF. New rural broadband is also coming from the numerous electric cooperatives that have decided to build broadband in the areas where they serve rural electric customers. This is all great news because once a rural area has fiber it ought to be ready for the rest of this century. more
At the end of August, the FCC gave final approval to the requirement that ISPs must provide broadband labels. The FCC had originally approved the broadband labels in November 2022 but then received three petitions to further modify the rules. The recent order makes a few minor changes to the original order but largely leaves the original broadband label rules intact. more
The U.S. Federal Communications Commission (FCC) has seemingly joined forces with the marketing arm of the cellular industry in declaring that the spectrum between 7-16 GHz is now considered to be 6G. Chairman Jessica Rosenworcel recently announced that the agency would soon begin looking at the uses for this spectrum for mobile broadband. more
ICANN has spent years trying to figure out what to do with domain name variants, strings that look different but mean the same thing, for some definition of "the same." They've been trying to deal with them in second level domains for a decade, and are now working on rules to allow variant top-level domains. Unfortunately, variants don't work. The problem isn't putting them in the DNS; it's that once they're in the DNS, they don't work anywhere else. more
Like any business, service providers must constantly evaluate the success of their operations. For implementations and installments, this is usually done by setting a strategic objective and then measuring progress made towards completion. But for operational teams, success is often measured by the repeated achievement of daily goals aligned to corporate objectives. Setting these benchmarks and collecting this data is accomplished by frequently running key performance indicators (KPIs). more
Sponsored byWhoisXML API
Sponsored byVerisign
Sponsored byDNIB.com
Sponsored byRadix
Sponsored byCSC
Sponsored byVerisign
Sponsored byIPv4.Global