Featured Blogs

Most Viewed  –  Last 30 Day  |  Last 12 Months  |  All Time

Can We Really Blame DNSSEC for Larger-Volume DDoS attacks?

In its security bulletin, Akamai's Security Intelligence Response Team (SIRT) reported on abuse of DNS Security Extensions (DNSSEC) when mounting a volumetric reflection-amplification attack. This is not news, but I'll use this opportunity to talk a bit about whether there is a trade-off between the increased security provided by DNSSEC and increased size of DNS responses that can be leveraged by the attackers. more

Cuba’s (Hopefully Limited) ADSL Expansion

In 2015, ETECSA announced/leaked a plan to make ADSL service available in 50% of Cuban homes by 2020. I was skeptical. Doing so would mean investing a lot of money for obsolete technology between 2015 and 2020. They have recently announced the availability of ADSL connectivity at homes in portions of seven cities and, by December, they say some home connectivity will be available in every province. more

MailChimp Not Quite Ready for PrimeTimeML

With perhaps the most coveted valuation in the Email Industry at close to $10B, MailChimp is considered the most forward-thinking ESP on the planet boasting 12M customers, with outstanding brand recognition and an incredible leadership suite. But when it comes to installing RealTimeML, it's lollygagging mainly because it has not justified the actual value to productionalize RealTimeML across its client base. And also, because it is a challenge to execute! more

Genachowski to Broadband: Reduce Prices, Increase Speeds, Increase Access, Embrace Competition

Broadband providers are not taking the recent move by the FCC to reclassify broadband under Title II; i.e., put broadband under its regulation arm along with the likes of telephone companies, very lightly and have come out swinging to stop that effort... Seemingly at issue; an appeal brought by Comcast with the D.C. Court of Appeals and the subsequent defeat of the FCC's perceived role as a broadband regulator, ruling the communication had no authority under current legislation to sanction Comcast over a 2008 Internet throttling incident. more

Essential Cyber Security Steps for Your Business

Layered security is a concept that's important for anyone who wants to create a strong, successful defense strategy to understand. This is a strategy that relies on the use of multiple lines of defense in an attempt to repel any potential attacks. For this reason, it's based on the principle that says "no single form of protection is enough to stop a determined cybercriminal. more

The Future of Internet Governance? Comments on IGF 2018 Speech by French President Emmanuel Macron

Macron has declared the Internet to be under threat. Without stepping back to question and explore the underlying causes of those threats, he uses them as a justification to propose a different approach to, albeit limited, current Internet Governance processes. Here we explore his proposals and some of the issues they generate. He acknowledges that Civil Society and the private sector have been core drivers in the creation of the Internet. He argues that its benefits and existence are endangered by predatory practices. more

SpaceX Is Testing Starlink Roaming

Last April, Elon Musk tweeted that Starlink "should be fully mobile later this year, so you can move it anywhere or use it on an RV or truck in motion." It is good to know that mobility with a standard dish is in the works, but it's not yet available. David Lang had been able to connect his Starlink terminal about fifteen miles from his home in Simi Valley, California, but when he brought it to my place in Carpinteria, California, about forty-three miles away and in a different coverage cell, it failed to connect. more

EU Approval for 4G Technologies to Use GSM Bands - A Boost to Rural Mobile Broadband

The EC recently approved technical rules on how the 900MHz and 1800MHz frequency bands should be utilised for 4G services, including LTE and WiMAX. National governments have until the end of 2011 to implement the decision into national legislation. Restrictions were initially imposed by the 1987 GSM Directive which limited these bands for 2G. more

Renesys Chronicles Today’s Internet Blackout in the Sudan (Now Restored)

The team over at Renesys has once again provided a great analysis of an Internet outage in a country, this time in Sudan. In the article simply titled "Internet Blackout in Sudan", Doug Madory writes: A few hours ago, we observed a total Internet blackout in Sudan and, as we publish this blog, the Internet remains largely unavailable. By count of impacted networks, it is the largest national blackout since Egypt disconnected itself in January 2011..." more

UN Moves on Internet Governance: Latest Dispatch

Some unsettling plans declared themselves at the International Telecommunication Union (ITU) this week as countries prepared for the up-coming treaty-making jamboree called the World Conference on International Telecommunications (WCIT). This community will now have to decide what it does about them. ... It was significant to the CircleID community that the ITU's top dog -- the Secretary General - appeared in person before the assembled countries with a reassurance: the broad and unusual WCIT treaty negotiation, though it may treat many issues, would not take up Internet governance. more

Trump’s Strange WRC-19 Letter

The 2019 World Radiocommunication Conference (WRC-19) is underway. It is the latest in a continuum of treaty-making gatherings that began in 1903 and is devoted to the now 116-year-old art of globally carving up the radio spectrum among designated uses that is instantiated in the Radio Regulations treaty agreement. Not unexpectedly, the event includes designation of 5G spectrum that flows from the requirements long set in 3GPP and GSMA. more

Demystifying ISP Oversubscription

I think the concept that I have to explain the most as a consultant is oversubscription, which is how ISPs share bandwidth between customers in a network. Most broadband technologies distribute bandwidth to customers in nodes. ISPs using passive optical networks, cable DOCSIS systems, fixed wireless technology, and DSL all distribute bandwidth to a neighborhood device of some sort that then distributes the bandwidth to all of the customers in that neighborhood node. more

On Internet Centrality and Fragmentation

I attended a workshop on the topic of Internet Fragmentation in July. The workshop was attended by a small collection of Australian public policy folk, some industry representatives, folk from various cyber-related bodies, and those with a background in Internet Governance matters. It was a short meeting, so the perils of fragmentation were not discussed at length, as they often can be, but the concerns about the breakup of the essential bonds that keep the Internet together were certainly palpable in that meeting. more

SEC Asks Companies to Disclose Cyberattacks

I came across an interesting article on Reuters today: "U.S. securities regulators formally asked public companies for the first time to disclose cyber attacks against them, following a rash of high-profile Internet crimes..." This is a pretty big step for the SEC. Requiring companies to disclose when they have been hacked shifts the action on corporations from something voluntary to something that they have to do. The question is do we want to hear about everything? more

Join An Online Dialogue About Encryption - Wednesday, May 25, at 13:30 UTC

What are your concerns around encryption? What questions do you have about the legal, technical and policy aspects of the increasing use of encryption? How does encryption help bring about a higher level of trust in the Internet? On Wednesday, May 25, the Internet Society and its Greater Washington, DC Chapter are hosting an "Online Dialogue About Encryption" to discuss all these questions and many more. more

Topics

IPv4 Markets

Sponsored byIPv4.Global

Threat Intelligence

Sponsored byWhoisXML API

DNS

Sponsored byDNIB.com

Cybersecurity

Sponsored byVerisign

Brand Protection

Sponsored byCSC

New TLDs

Sponsored byRadix

Domain Names

Sponsored byVerisign

Latest Blogs

Recently Discussed

Most Discussed – Last 30 Days