fTLD Registry Services, LLC has announced an agreement with Symantec Corporation to provide verification services for the ".bank" and ".insurance" generic top-level domains. According to the report, Symantec will be responsible for adding a layer of protection to the new domains by verifying the eligibility of companies requesting domain names, making sure the person requesting the domain name is authorized by the company and ensuring the name requested by the company complies with fTLD's policies. more
I've worked with a number of small communities that want to explore the idea of having a community-owned ISP. My advice to small communities is the same as with all clients - economy-of-scale really matters for ISPs. Economy-of-scale is the economic term for describing how businesses get more efficient as they get larger. It's fairly easy to understand, and the classic example is to look at the impact of the salary and costs of the general manager of an ISP. more
In Part 1 of "Bug Bounty Programs: Are You Ready?" we examined the growth of commercial bug bounty programs and what organizations need to do before investing in and launching their own bug bounty. In this part, we'll discuss why an organization needs to launch a bug bounty program, and what limits the value they will likely extract from such an investment. more
Rodney Joffe, Senior Technologist at Neustar, explaines that vehicles (beginning with 1998 models) are vulnerable to hacking, but manufacturers have been unable to fix the problem. In the video below, Joffe explains the challenge to cars and the possible threats that exist for other machines connected to a network. more
The international community is converging on one notion at least: that Facebook cannot be prosecutor, judge and jury of its own achievements and transgressions. The calls to regulate social media companies first came from various legislative bodies, then from civil society and national policymakers, then from the CEO of Facebook itself, "to preserve what is best about [the Internet]." If some scepticism followed that was natural enough – was the company sincere in calling for more regulation? more
Ren Zhengfei tells the Economist and the NY Times he is prepared to give the US essentially everything the President has asked, including the crown jewels: the complete design and source code of Huawei's 5G system. Ren would "license the entire Huawei 5G platform to any American company that wants to manufacture it and install it and operate it, completely independent of Huawei." more
The ICANN Board meeting undertaken recently in Nairobi was indeed eventful and there were many vital topics on the agenda, in particular for the new gTLD program that kept many interested parties on the edges of their seats as the meeting unfolded. ... One of the more controversial decisions was in regard to the Expression of Interest (EOI), a program intended to allow potential new gTLD applicants to pre-register for their desired TLD and provide ICANN and the community with invaluable information regarding likely volumes of applications. more
The Information Technology Industry Council (ITI) published a recent report that looks at "5G policy Principles and 5G Essentials for Global Policymakers." For those who don't know ITI, they are a DC-based lobbying group that represents most of heavy-hitter tech firms, and which works to help shape policy on tax, trade, talent, security, access, and sustainability issues. I don't think I've seen another document that so clearly outlines the hopes of the big US cellular companies. more
According to a report by the Defense Science Board, the President-elect Barack Obama will inherit a cybersecurity infrastructure that is ill-prepared for advanced cyberattacks which will be of particular challenge for the new leaders... Reporting today on eWeek, Roy Mark writes: "The Bush administration has been widely criticized by security experts as de-emphasizing cyber-security and hamstringing the authority of officials in charge of government-wide cyber-security" said Roy Mark in a report eWeek." more
A recent study critically examines the security of popular end-to-end encrypted (E2EE) cloud storage providers, uncovering significant vulnerabilities in platforms widely marketed for their user-controlled privacy features. more
If you operate an Internet Exchange Point (IXP) or are interested in creating one, the Internet Society has a “Sustainable Peering Infrastructure” funding program that is open for applications until this Friday, September 6, 2024... Grant funds from USD $5,000 up to $50,000 are open to all regions and are available to assist in equipment purchases (switches, optic modules, servers, and routers), training, capacity building, and community development. more
A national-level cybersecurity industrial park is under development in Beijing, China to boost the industry and tap into the potential of domestic tech companies. more
With companies realizing the threat of hefty fines, lawsuits, and executive resignations that can follow security breaches, companies are scrambling to scoop up scarce security experts. more
One of the main roles played by science fiction is to portray fundamental issues and questions that face humanity long before they actually become relevant to our daily lives. We cannot always be sure of where our reality ends, and fiction begins. Star Trek storylines including Borgs are a good example. In the storyline, Borgs are part organic, part artificial and created eons ago, yet they seem to presage the challenges in our contemporary personal reality and challenges in the Internet's cyberspace. more
After two years of meetings, comment periods, and more meetings, the Internet Corporation for Assigned Names and Numbers submitted its IANA transition proposal to the US Department of Commerce last week at the end of the ICANN 55 meeting in Marrakech. While this is a critical milestone and the multi-stakeholder community should be commended for its efforts, several concerns still remain. more