/ Most Viewed

The Cyber Security Ecosystem: Collaborate or Collaborate - It’s Your Choice

As cyber security as a field has grown in scope and influence, it has effectively become an 'ecosystem' of multiple players, all of whom either participate in or influence the way the field develops and/or operates. It's increasingly evident that, more than ever, it is crucial for those players to collaborate and work together to enhance the security posture of communities, nations and the globe. more

The ITU Busan Plenipotentiary

The ongoing ITU Plenipotentiary Conference in Busan South Korea is the quadrennial gathering where its Nation State Members gather to elect new leadership of its four permanent secretariats and populate a few other of its assorted bodies. The next two weeks are spent in endless sessions where several regional blocs of Members still enamored with pre-liberalization telecom models complain about the new world of telecommunications that they did not invent -- while engaging in copious use of their new smart phones and online services. more

Assigning 32-bit ASNs

With 16-bit Autonomous System Numbers (ASNs), 65,536 unique numbers are possible. Just like 32-bit IP addresses, these 16-bit ASNs are becoming a scarce resource. Therefore, in 2007 the Internet Engineering Task Force (IETF) developed a new format, 32-bit ASNs (RFC 4893), which increases the supply of ASNs to four billion. more

The New ICANN Emerges in Seoul

With the loud crashing of a traditional drum ceremony and an impromptu electric guitar performance by a young Korean whose rendition of Pachabel has been downloaded sixty million times on YouTube, the 36th meeting of ICANN was kicked off this morning (Korean time) by new CEO Rod Beckstrom and his fellow Directors and assembled one thousand or so participants. ICANN has always been about change, but the atmosphere in Seoul this week is charged with a sense of new challenges and new opportunities. more

Worming Our Way Out of Trouble

The Conficker worm will be active again on April 1st, according to an analysis of its most recent variant, Conficker.C, by the net security firm CA. This malicious piece of software, also known as Downup, Downadup and Kido, spreads among computers running most variants of the Windows operating system and turns them into nodes on a multi-million member ‘botnet’ of zombie computers that can be controlled remotely by the worm’s as yet unidentified authors. more

Four Steps to an Effective Brand Protection Program

Internet use has become ever more pervasive. With around five billion global users, it generates an economy of around 15% of global gross domestic product (GDP); that's around $15 trillion and is a figure that's growing 2.5 times faster than GDP itself. This makes the internet an attractive channel for infringers. Phishing and other fraud tactics, selling counterfeit goods online, and digital piracy are primary areas of concern. more

Time to Stop Talking About Unserved and Underserved

I work with communities all of the time that want to know if they are unserved or underserved by broadband. I've started to tell them to toss away those two terms, which is not a good way to think about broadband today. The first time I remember the use of these two terms was as part of the 2009 grant program created by the American Recovery & Reinvestment Act of 2009. The language that created those grants included language from Congress that defined the two terms. more

New Revenue Models for the ‘Software Telco’

I was recently asked how telcos might come up with new business models for a world where all resources are under software control. The core idea is to match network supply and demand in space and time (and at all timescales). I've typed up my notes for the curious to critique...Today's telco is more like a static utility 'pipe', the way that gas, electric or oil are delivered. It sells direct access to raw network mechanisms, and users buy circuits that offer a fixed bandwidth in space and time. more

Article 22 of the GDPR Should Not Preclude Contemplated Automation

There is an ongoing disagreement among various members and groups in the ICANN community regarding automation -- namely, whether and to what extent automation can be used to disclose registrant data in response to legitimate data disclosure requests. A major contributing factor to the complications around automation has been confusion about how to interpret and apply Article 22 of the GDPR. more

Amazon Launched Its First Two Internet Satellites Into Orbit

Amazon launched its debut prototype satellites, Kuipersat-1 and Kuipersat-2, from Florida's Cape Canaveral on Friday. This marks the tech giant's initial foray into space, aiming to rival SpaceX's Starlink broadband network.  more

Omnibus Cybersecurity Bill May Not Go Where Original Authors Intended

In an interview with GovInfoSecurity, Sen. Thomas Carper said that the U.S. Senate is considering attaching cybersecurity legislation to a defense authorizations bill. Though clearly a ploy to be able to say "we did something about those evil hackers" before the elections, CAUCE applauds the attempt. There can be no doubt that the United States (and many other countries) sorely needs better laws to deal with these threats. more

UDRP and the ACPA Differences, Advantages and Their Inconveniences

The ACPA and the UDRP provide two separate and distinct methods for resolving domain name disputes. Both alternatives have many critics and proponents, but the true value of each will ultimately be determined by how well each combats cyber-squatting. Separately, the UDRP and the ACPA will probably work well to defuse most of the cyber-squatting that is currently invading the Internet. If combined together the UDRP and the ACPA can be a cost saving and effective way to prevent cybersquatting... more

Ten Years of UDRP

In 1999, the Internet Corporation for Assigned Names and Numbers (ICANN) developed a policy to resolve disputes between trademark owners and registrants of domain names. This policy, the Uniform Domain-Name Dispute Resolution Policy (UDRP) was made available for disputes concerning an alleged abusive registration of a domain name. In the past 10 years alone, more than 16,000 disputes have been filed resulting in more than 10,000 domain name transfers. more

11 Information Economy Policy Reversals Coming to a Marketplace Near You!

In the wake of the election, sweeping policy shifts in the information economy are set to accelerate. Expect fast-tracked FCC reforms, Starlink subsidies, and AI-driven oversight to redefine media, tech, and regulatory landscapes. From relaxed antitrust to intensified media control, these eleven reversals signal a move toward deregulation and Chicago School libertarianism, with lasting impacts on U.S. markets and governance. more

Designing Secure Networks with Cisco Technology, Part 1

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies.... "Wisdom consists in being able to distinguish among dangers and make a choice of the least harmful." That quote is quite possibly the most accurate depiction possible of the never-ending struggle between network security and corporate budget. Providing a mechanism to defend the enterprise network from every conceivable threat is impossible in terms of both technology and funding. more