Are you ready? Are your systems prepared so that DNS will keep functioning for your networks? One week from today, on Thursday, October 11, 2018, at 16:00 UTC ICANN will change the cryptographic key that is at the center of the DNS security system - what we call DNSSEC. The current key has been in place since July 15, 2010. This is a long-planned replacement.
While Cuban president Miguel Díaz-Canel was in New York to address the United Nations, he met with members of Congress and executives from the agriculture, travel and information and communication technology (ICT) industries. The ICT meeting was at Google's New York office and ten other companies attended. In addition to Díaz-Canel the Cuban ministers of Foreign Affairs, Foreign Trade and Foreign Investment and Communications were at the meeting.
Thanksgiving is just around the corner in Canada. It's a time of year when the harvest is in, the weather grows colder and families gather to give thanks for all they have. It is in this moment of gratitude that I want to highlight one of the most valuable and unique offerings in our industry: the ways in which country code top-level domains (ccTLDs) give back. Canadians who choose to use a ccTLD, which for us is .CA, help contribute to investments in the internet community.
It is remarkable? - ?for all the wrong reasons? - ?that only two months remain before the National Telecommunications and Information Administration (NTIA) must make a fateful decision on how it will address its' long-standing Cooperative Agreement with Verisign? - ?the private-sector corporation that edits the authoritative address book of the Internet's Domain Name System (DNS), maintains two of the DNS root servers, and operates the .com and .net registries of the Internet, undoubtedly one of the most lucrative concessions ever granted.
The information security industry, lacking social inhibitions, generally rolls its eyes at anything remotely hinting to be a "silver bullet" for security. Despite that obvious hint, marketing teams remain undeterred at labeling their companies upcoming widget as the savior to the next security threat (or the last one -- depending on what's in the news today). I've joked in the past that the very concept of a silver bullet is patently wrong...
In the fall of 1998, I was present at the first meeting of the ICANN Board which was then made up of very senior, prominent parties from a broad spectrum of sources. Much to her credit, Esther Dyson accepted the position as the first Chair of the ICANN Board for the newly birthed organization. I was in attendance in support of the nomination of Michael Roberts as the first ICANN CEO. It was a time of uncertainty.
In the discussions proceeding the World Intellectual Property Organization (WIPO) publishing The Management Of Internet Names And Addresses: Intellectual Property Issues (Final Report, April 30, 1999) that ultimately led to the ICANN implementing the Uniform Domain Name Dispute Resolution Policy (UDRP) (1999) commentators considered three remedies to combat cybersquatting: suspending, cancelling, and transferring infringing domain names.
When rolling out a new protocol such as IPv6, it is useful to consider the changes to security posture, particularly the network's attack surface. While protocol security discussions are widely available, there is often not "one place" where you can go to get information about potential attacks, references to research about those attacks, potential counters, and operational challenges.
In 1998 the idea of "Newco," ICANN's informal predecessor name, was dreamlike. It was so new, so unprecedented, that it was constantly being referred to as an "experiment." It was not every day that one came across an organization conceived by one nation (e.g., the U.S.), that was available for globally shared ownership. One that was defined, in large part, by international participation.
Despite headlines now at least a couple of years old, the InfoSec world is still (largely) playing lip-service to the lack of security talent and the growing skills gap. The community is apt to quote and brandish the dire figures, but unless you're actually a hiring manager striving to fill low to mid-level security positions, you're not feeling the pain -- in fact, there's a high probability many see problem as a net positive in terms of their own employment potential and compensation.