Cybersecurity

Sponsored
by

Cybersecurity / Featured Blogs

Security Against Election Hacking - Part 1: Software Independence

There's been a lot of discussion of whether the November 2016 U.S. election can be hacked. Should the U.S. Government designate all the states' and counties' election computers as "critical cyber infrastructure" and prioritize the "cyberdefense" of these systems? Will it make any difference to activate those buzzwords with less than 3 months until the election? First, let me explain what can and can't be hacked. Election administrators use computers in (at least) three ways... more

Video: Interview with Jari Arkko at IETF 96 in Berlin

Would you like to understand the major highlights of the 96th meeting of the Internet Engineering Task Force (IETF) last month in Berlin? What were some of the main topics and accomplishments? How many people were there? What else went on? If so, you can watch a short video interview I did below with IETF Chair Jari Arkko. more

NTP is Still a Security Risk

The Network Time Protocol (NTP) has been in the news a number of times over the past couple of years because of attacks on the protocol, vulnerabilities in the daemon, and the use of NTP in DDoS attacks. In each case, the developers of NTP have responded quickly with fixes or recommendations for remediating these attacks. Additionally, the development team has continued to look ahead and has worked to enhance the security of NTP. Unfortunately, that has not translated to an improved security picture for NTP. more

Internet: Quo Vadis (Where are you going?)

Articles, blogs, and meetings about the internet of the future are filled with happy, positive words like "global", "uniform", and "open". The future internet is described in ways that seem as if taken from a late 1960's Utopian sci-fi novel: the internet is seen as overcoming petty rivalries between countries, dissolving social rank, equalizing wealth, and bringing universal justice. If that future is to be believed, the only obstacle standing between us and an Arcadian world of peace and harmony is that the internet does not yet reach everyone... more

Final Day to Give Input on “Future of the Internet” Survey

Today, June 26, is the final day that you can help the Internet Society with its "Future of the Internet" survey. It takes about 20-25 minutes and will help my colleagues at the Internet Society develop a number of scenarios about the possible future of the Internet. These scenarios can help all of us in talking to policy makers, leaders, media and the general user population about the choices we have before us for the future of the Internet. more

The Value of Openness for Building Tomorrow’s Digital Economy - Reflections on the OECD Ministerial

Yesterday marked the last day of the OECD Ministerial Meeting on the Digital Economy, but also the culmination of a week where the need for an open and trusted Internet has been the main message from all stakeholders. Back in 2008, the OECD was one of the first intergovernmental organizations to open its discussions to the wider Internet community. more

ICANN 56 in Helsinki - Schedule of DNSSEC Activities

The ICANN 56 meeting takes place in Helsinki, Finland, from June 27-30 and while it is a smaller "policy forum" style of meeting, there will still be some activities related to DNSSEC, DANE and DNS security in general. DNSSEC Workshop The DNSSEC Workshop will take place on the morning of Monday, 27 June 2016. All times are Eastern European Summer Time (EEST), which is UTC+3. more

Which Direction Will the Internet Go? Take Our Survey and Help Us Explore the Forces at Work

In the past seven years, the number of people online has essentially doubled, from 1.7 billion in 2009 to about 3.4 billion today. New and innovative services have also emerged and people and companies around the world are using the Internet in ways barely imagined at the turn of the decade. Looking ahead to the next five to seven years, there are many forces at work that could have a significant impact on the Internet. more

Who Is Responsible for Your Application’s Security?

The dividing line between developers and IT operations used to be distinct. Developers were responsible for adding new features securely, but it was IT operations who had responsibility for infrastructure and network security. For the most part, developers didn't have to think too much about the wider security context. With the advent of the cloud, and of devops, things changed radically. more

Ethical Hacking: Turning The Tables to Boost Cyber Security

Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States had their personal information stolen. For companies, the stakes are huge: Compromised systems not only damage the bottom line but can severely impact public opinion. more