/ Most Viewed

FedRAMP: Critical to Cost-Effective Cloud Computing Cybersecurity

In September 2009, the Obama Administration announced the Federal Cloud Computing Initiative. As the government's CIO explained, cloud computing "has the potential to greatly reduce waste, increase data center efficiency and utilization rates, and lower operating costs." The Federal Risk and Authorization Management Program (FedRAMP) addresses the key elements of a cloud computing framework for federal agencies. more

Comparative Broadband Ideas

The primary reason that Japan and Korea do so much better than the U.S. on any measurement of broadband (availability, penetration, price, speed) is that there is fierce competition in the market for broadband internet access in these countries. ...How do you increase competition in the U.S. for broadband access? Right now, we have giants fighting with each other -- cable and telephone companies. Small numbers of these companies control 80%-90% of the market for broadband access... more

Advanced AI Is Reshaping the Cybercriminal Landscape at Alarming Speed

A new report has shed light on how advanced artificial intelligence is reshaping the cybercriminal landscape. The latest threat intelligence assessment by Anthropic details how its AI model, Claude, was misused in a string of global cyberattacks that mark a sharp escalation in both scale and sophistication. more

The Human Factor in DDoS Attacks

Ripped from the headlines: A recent DDoS attack lasted an entire 60 days. In other news, a single site was attacked 218 times in Q2 alone. To those of us in the business of protecting Web infrastructure, these stories are hardly surprising. What's notable, though, is where they were reported, in The Financial, whose focus is banking and financial services, not technology. The reporters used the term "DDoS" as if it were as common as "hedge fund," something everyday business people, not just techies, grasp. It's this human element that caught my interest and got me thinking a little. more

FBI Takes Down ‘Genesis Market’ Cybercrime Store: Dozens Arrested Worldwide

Today's FBI action against Genesis Market is the latest in a string of coordinated efforts to take down bot shops and other services that enable cybercrime. Earlier this year, the FBI seized Webstresser.org, a DDoS-for-hire service that was thought to be responsible for launching a massive attack against the City of Atlanta in 2018.  more

False Expectations: Attorney’s Fees and Statutory Damages in ACPA Actions

There is a degree of dread in the investor community that prized domain names will be forfeited to trademark owners in proceedings under the Uniform Domain Name Dispute Resolution Policy (UDRP). Since the UDRP has no internal appeal mechanism to correct errors of law or judgment, the sole recourse is an action in a court of competent jurisdiction as spelled out in UDRP paragraph 4(k). In the U.S., this would be a district court under the Anticybersquatting Consumer Protection Act (ACPA). more

Geely’s LEO Constellation for Mobile Vehicle Connectivity

The Geely Holding Group (GHG) is a private Chinese conglomerate that is highly diversified but best known as an auto manufacturer that envisions itself as a "global mobile technology group." GHG announced this week that it has begun construction of an intelligent satellite production and testing facility that will include modular satellite manufacturing, satellite testing, satellite R&D, and cloud computing centers.

Update Mar 2, 2024:

Geely launched eleven satellites in the same 50-degree inclination plane as the first nine, but there was a considerable delay between the two launches. The first nine were launched in June 2022 and the second 11 were launched in February 2024. The delay may have been caused by a satellite re-design -- The mass of these satellites is 130 kg whereas the first nine satellites had masses of 100 kg.

The launch cadence will have to speed up if they are to reach their goal of beginning service with 72 t satellites next year. more

The Suitable Defendant Rule: In Rem Jurisdiction under the ACPA

The Anticybersquatting Consumer Protection Act (ACPA) creates two distinct avenues by which mark owners may seek a remedy for cybersquatting. A person who is a suitable defendant under 15 U.S.C. §1125(d)(1)(A) is one over whom the court has in personam jurisdiction. However, if the mark owner is "not able to obtain in personam jurisdiction over a person who would have been a defendant" in the ACPA action, then "[t]he owner may file an in rem civil action against a domain name in... more

A Serious Bug in the Similarity Check

A week ago, ICANN announced the latest delay in the New gTLD Program: the so-called "contention sets" will only be published March 1, 2013. The original deadline was July 2012, postponed serially in two-month intervals. The gTLD program is lost in confusing similarity. What went wrong? In order to determine which TLD applications are in contention, it is necessary to say which TLD strings are confusingly similar to one another. more

Will the Cloud Kill Telecom Vendors?

There are many big questions in telecom these days, and this is one that's on my mind right now. Over the past few months, I've participated in events or briefed with leading vendors in our space, namely Avaya, ShoreTel, BroadSoft, Aastra, Metaswitch, Mitel, Interactive Intelligence, and this week Cisco. Every analyst has their own core circle of vendors they stay close to, but I'd say that's a pretty fair representation of who's driving telecom. To varying degrees, all of these vendors have a cloud story, and the more I hear it, the more I start to wonder what it really means. more

The FCC Cyber Trust Label Gambit: Part II

Sixty years ago, Paul Baran and Sharla Boehm at The RAND Corporation released a seminal paper that would fundamentally reshape the cyber world forever more. Their paper, simply known as Memorandum RM -- 1303, described how specialized computers could be used to route digital communications among a distributed universe of other computers. It set the stage for a flood of endless developments that resulted in the interconnected world of everything, everywhere, all the time. more

DNS Abuse Institute Launches Centralized DNS Abuse Reporting Service

The DNS Abuse Institute (DNSAI), the entity created by Public Interest Registry (PIR), today announced the launch of NetBeacon, a centralized DNS Abuse reporting service. NetBeacon was developed in collaboration with CleanDNS, an anti-abuse solution developer, which has donated the development and technology behind NetBeacon. more

Interop Las Vegas 2009 IPv6 Survey

We've heard on this site and many other trade journals that the IPv4 address space is running out (and a unique proposal about simulating outages) and that dire consequences occur if we do not act. Last week in Las Vegas, the Interop show took place. An unofficial count of 14,000 technology buyers and enthusiasts attended. While much lower than its record (over 100,000 strong), the show is still the biggest technology show which features a major presence by virtually every networking vendor. ...we decided to walk the Interop Expo and ask the IPv6 support question to see if the mainstream corporate and enterprise space agrees with the need to think beyond IPv4. more

What’s So Outrageous Asking High Prices for Domain Names?

Panels appointed to hear and decide disputes under the Uniform Domain Name Dispute Resolution Policy (UDRP) have long recognized that three letter domains are valuable assets. How investors value their domains depends in part on market conditions. Ordinarily (and for good reason) Panels do not wade into pricing because it is not a factor on its own in determining bad faith. more

“The Broadband Revolution”

The International Telecommunications Union recently issued a press release announcing with joy the release of "the first set of global standards for Internet Protocol TV (IPTV)." A key sentence: "A combination of voice, Internet and video services over a single broadband link and from a single provider is foreseen as the ultimate goal of the broadband revolution." Those of you who lived through 'What Is Broadband Good For?' with me last summer, know that the word "broadband" is a pet bugaboo of mine. It's a word that answers a lot of policy questions in a particular way. more