/ Most Viewed

China Seeking to Construct Its Own Uncrackable Smartphones

Beijing and leading Chinese tech firms are collaborating to build a secure smartphone for government officials that rely on domestically built operating system and processor chip, according to reports. more

What Internet Governance Boils Down To

Listening to several of the discussions here at the IGF (so far), my post from yesterday seems to be close to what the focus of this meeting is, control and access to resources. Yesterday I highlighted areas of Governance where Governments actually could help, and make difference. Admittedly, that is not all the aspects of governance though. more

Why Africa’s Cybersecurity Problem Has Nothing to Do with Hackers

Africa's cybersecurity failures stem less from sophisticated hackers than from insecure system design, weak governance and limited skills, leaving institutions exposed and shifting the challenge from external threats to internal accountability and resilience. more

Cracks Appearing in Trump’s Huawei Boycott

It must have been a galling experience for President Trump when his good mate British Prime Minister Boris Johnson failed to step in line with Trump's demand that the UK should also boycott the Chinese firm Huawei by not allowing them to be involved in the rollout of 5G in Britain. However, the involvement of Huawei will be limited. It further proves that boycotting Huawei is a political and not a technical issue. more

FCC to Review State AI Regulation

The FCC is considering whether it can preempt state-level AI regulations using telecommunications law. Legal precedent and jurisdictional ambiguity, however, make such a maneuver uncertain and likely to face significant industry and judicial resistance. more

China Nearing Full Mobile Broadband Coverage

China’s mission to put its entire population on the internet is almost complete, as analysts predict full mobile broadband network coverage in the world’s second-largest economy within the next few years. more

Data Breach Costs Continue to Rise, 40% Increase Since 2005

According to a new study by PGP Corporation and Ponemon Institute, data breach incidents cost U.S. companies $202 per compromised customer record in 2008, compared to $197 in 2007. The study is based on 43 organizations across 17 different industry sectors with a range of 4,200 to 113,000 records that were affected. It is also noted that since 2005, the cost component has grown by more than $64 on a per victim basis since -- nearly a 40% increase. more

IPv6 Deployed But in Unexpected Places

Eric Vyncke reporting in the NetworkWorld: "IPv6 exists for more than 15 years and it is rumored to be deployed extensively in Asia and especially in Japan and China with Africa being the last continent to deploy IPv6. Another place where there should be a lot of deployments is of course in the USA with the US Government IPv6 mandates. But, when it comes to measure where web sites are actually deployed over IPv6, the rumor proves to be just a myth..." more

A Spectrum Crisis?

CTIA, the trade association for cellular companies, published a recent blog titled, "The Looming Spectrum Crisis". The blog quotes a study from Accenture that concludes that a lack of spectrum for 5G is reaching a point of crisis. The Accenture study says that cellular networks will be unable to meet nearly one-fourth of peak-period requests for connection as soon as 2027. more

DHS Asks Citizens to Practice Good “Cyber Hygiene”

Kicking off the sixth annual National Cybersecurity Awareness Month this October, the Department of Homeland Security (DHS) has urged computer users to practice good "cyber hygiene". The campaign was given a boost Wednesday when the Senate passed resolution 285 to support its goal to make U.S. citizens more aware of how to secure the internet. DHS has also announced that is has been given new authority to recruit and hire up to 1,000 cybersecurity professionals across the department to fill roles such as: cyber risk and strategic analysis; cyber incident response; vulnerability detection and assessment; intelligence and investigation; and network and systems engineering. more

ICANN Releases Initial Evaluation Results for First Set of New gTLD Applications

The first round of Initial Evaluation results has been released exactly on schedule. On March 23, ICANN announced that 27 out of 30 new gTLD applications reviewed this round passed Initial Evaluation. The remaining three applicants are still marked as in Initial Evaluation. more

Dutch Telecomm Authority is Asking Hotels to Register as ISPs

Dutch sources are reporting that OPTA, the dutch telecommunications authority, has asked more than a dozen hotels to register as Internet service providers. The move has frustrated the Hospitality Association... more

Intel to buy McAfee for $7.68 Billion, Biggest Acquisition in 42-Year History

Intel plans to buy security company McAfee for $7.68 billion -- the biggest acquisition in its 42-year history. The chipmaker said Thursday it has entered into a definitive agreement to buy all of McAfee's common stock at $48 per share in cash. McAfee's stock closed Wednesday at $29.93, making Intel's offer a 60 percent premium. The boards of both companies have approved the deal. more

Domain Name Association Supports IANA Transition, Petitions Congress to Move Forward

I recently sent a letter to congressional leaders including Speaker of the House Paul Ryan; House Minority Leader Nancy Pelosi; Senate Majority Leader Mitch McConnell and Senate Minority Leader Harry Reid expressing the Domain Name Association's support of the U.S. Administration's planned transition of the Internet Assigned Numbers Authority (IANA) to the global multi-stakeholder community under the stewardship of the Internet Corporation for Assigned Names and Numbers (ICANN). more

Taking the Long View: Will This Be the Year ISPs Rethink Their Business Plans

I have to wonder if this year is making the big ISPs rethink their business plans. For years, many big ISPs have foregone making long-term investments in broadband and instead chased the quick return. A good example is CenturyLink. Before the merger with Level 3, the company had started a program to replace the copper plant in urban markets with fiber aggressively. At the peak, the company built fiber to pass 700,000 homes a year. more