The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. more
There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more
For the fourth year, the U.S. Securities and Exchange Commission's Office continues to include cybersecurity as one of the top enforcement priorities for 2019. more
On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more
ICANN plans to announce the long-anticipated list of applied-for domain names under its new generic Top-Level Domain (gTLD) program tomorrow. The announcement will be made in London at 12:00PM and streamed live on ICANN's website. ICANN has received over 1,900 applications from around the world. more
This past month on 03-06 March, the global industry sub-group that exists at the center of 5G security met virtually. It is known as SA3 within the 3GPP organization, and it met over a period of five days to deal with some of the most important 5G security requirements. 3GPP is a "partnership" created among all the world's major standards bodies, which over several decades has cooperatively developed and evolved by far the largest and most successful global electronic communications network. more
Barely a week passes without something in the news that reminds us of the critical role encryption plays in securing our data. It is a technology that protects so much of what we rely on, as individuals protecting our privacy, as companies securing our business assets and transactions, and as governments responsible for critical national infrastructure. ... The request Kathy mentions came after the San Bernardino shootings in California... more
U.S. House Republicans have invited CEOs of major technology and telecommunications companies to weigh in on the net neutrality debate amidst Federal Communications Commission move to repeal the Obama-era rules. more
"Pai, a Barack Obama nominee who has served as the senior FCC Republican for more than three years, could take the new role immediately and wouldn't require approval by the Senate because he was already confirmed to serve at the agency," Alex Byers and Tony Romm reporting in Politico. more
James Cowie from Renesys reports: "Starting at 3:35 UTC today (6:35am local time), approximately two-thirds of all Syrian networks became unreachable from the global Internet. Over the course of roughly half an hour, the routes to 40 of 59 networks were withdrawn from the global routing table." more
In follow up to its earlier announcement this year regarding the relaxation of rules for the introduction of new Top-Level Domains, the Internet Corporation for Assigned Names and Numbers (ICANN) yesterday released a draft version of the Applicant Guidebook for those interested in applying for a new generic Top-Level Domain (gTLD). Although application comes with a hefty entry fee of close to $200,000, the development of new gTLD introductions will be of particular interest to trademark owners as well as any other company involved with domain names. Among various issues, the guidebook aims at addressing concerns such as who would qualify for '.apple' or '.amazon' gTLDs. more
How can our threat intelligence platform deliver more? This is a question many business professionals employing threat intelligence practices are asking themselves as their companies continue to fall short against the machinations of modern-day cybercriminals. The truth is that while threat intelligence is certainly not a silver bullet, organizations often make a mistake when they opt for a platform without considering several important factors that can help them evaluate the market better and deploy the practice more effectively. more
The FCC voted recently to implement consumer broadband labels. This was required by section 60504 of the Infrastructure Investment and Jobs Act. The new rules will become effective after the Office of Management, and Budget approves the new rules and after the final notice is published in the federal register. ISPs will then generally have six months to implement the labels. The labels look a lot like the nutrition labels that accompany food. more
While most of the recommendations included in the Cross Community Working Group on Enhancing ICANN Accountability (CCWG-Accountability) Report are much needed reforms to ICANN's accountability mechanisms, the proposal also contains a fundamental flaw, which jeopardizes its overall acceptance and risks delaying the IANA transition process further: it changes the role of governments from "advisory" to "decisional" over ICANN's governance, and it separately enhances the power of governments over ICANN's board of directors. more
CaribNOG and PCH have renewed their partnership to boost the Caribbean's Internet resilience, expanding technical capacity, advancing inclusive training, and strengthening the people and systems essential for recovery as islands rebuild after Hurricane Melissa. more