/ Featured Blogs

Humans’ Best Defense Against Cybersecurity

At regular intervals, I have discussed the cybersecurity situation in Australia. In those assessments, I wrote about my frustration that the previous government policies more or less resembled a fire brigade approach. Trying to address individual incidents with regulations and legislation rather than coming up with a holistic strategy. more

Amazon’s Huge IoT Network

In a recent blog post, Amazon invited developers to test drive its gigantic IoT network. This network has been labeled 'Sidewalk' and was created by tying together all of Amazon's wireless devices like Amazon Echos and Ring cameras. Amazon claims this huge wireless network now covers 90% of U.S. households. Amazon created the network by transmitting Bluetooth and 900 MHz LoRa signals from its various devices. more

Adding ZONEMD Protections to the Root Zone

The Domain Name System (DNS) root zone will soon be getting a new record type, called ZONEMD, to further ensure the security, stability, and resiliency of the global DNS in the face of emerging new approaches to DNS operation. While this change will be unnoticeable for the vast majority of DNS operators (such as registrars, internet service providers, and organizations), it provides a valuable additional layer of cryptographic security to ensure the reliability of root zone data. more

UN and the Global Digital Compact: How to Strengthen the IGF?

According to UN Secretary-General Antonio Guterres, the forthcoming UN World Summit on the Future", scheduled for September 2024, should adopt a "Global Digital Compact" (GDC).1 The GDC is part of the so-called "UN Common Agenda." The compact is expected to "outline shared principles for an open, free and secure digital future for all" and to cover issues as digital connectivity, avoiding Internet fragmentation, providing people with options as to how their data is used... more

The Problem Of 5G Hype

I'm writing this as the 5G hype cycle reaches a new crescendo. What is most striking is how few of those touting 5G (or "private 5G") is how little technical detail there is beyond saying it is the next generation of cellular protocols. Yes, one can look at volumes of specifications with myriad options and flavors but no sense of 5G as such. That alone should make one suspicious - why does one have to eschew wires to get 5G? more

Return of Net Neutrality: Discussion of European Net Neutrality Proposal Relevant for U.S. Broadband Market

There is an interesting recent discussion in Europe about net neutrality that has relevance to the U.S. broadband market. The European Commission that oversees telecom and broadband has started taking comments on a proposal to force content generators like Netflix to pay fees to ISPs for using the Internet. I've seen this same idea circulating here from time to time, and in fact, this was one of the issues that convinced the FCC first to implement net neutrality. more

ICANN: Governance & Authority

It is almost 25 years since the Internet was privatized by the U.S. government. ICANN was formed by Esther Dyson and Jon Postel as a California-based non-profit with the responsibility to administer the Internet. However, the U.S. government retained limited control, primarily through the Internet Assigned Numbers Authority (IANA). It was the revelations, in 2013, of highly classified National Security Agency (NSA) documents by Edward Snowden that sparked global concerns over the U.S. dominance of the Internet.  more

Risk vs Benefit: The Impact of Shorter 90-Day SSL Certificate Life Cycles

In today's digital age, securing your website and ensuring your users' safety has never been more critical. Secure sockets layer (SSL) certificates are the go-to solution for securing websites by encrypting the data transmitted between web servers and browsers. Historically, SSL digital certificates could be valid for years, after which they had to be renewed or replaced.  more

U.S. National Cybersecurity Strategy and Its Impact on Domain Security

Last month, the U.S. National Cybersecurity Strategy was launched, providing a new roadmap for stronger collaboration between those operating within the digital ecosystem. The strategy calls on software makers and American industry to take far greater responsibility to assure that their systems cannot be hacked while accelerating efforts by the Federal Bureau of Investigation and the Defense Department to disrupt the activities of hackers and ransomware groups around the world. more

Minimized DNS Resolution: Into the Penumbra

Over the past several years, domain name queries - a critical element of internet communication - have quietly become more secure, thanks, in large part, to a little-known set of technologies that are having a global impact. Verisign CTO Dr. Burt Kaliski covered these in a recent Internet Protocol Journal article, and I'm excited to share more about the role Verisign has performed in advancing this work and making one particular technology freely available worldwide. more