There is no doubt that the number of online consumers is on a rise and that this is a trend that will not stop any time soon. Over the last couple of years, the number of digital buyers has grown by a steady 150 million each year. This number is expected to stay stable for a few more years to come. By 2020, about two billion people will be purchasing things online and making online money transactions on a regular basis. more
The hiQ ruling erased legal protections against commercial scraping, leaving infrastructure providers to absorb escalating costs. Without federal action defining data misappropriation, a free-rider AI economy could undermine open networks, investment, and long-term data integrity. more
In what is currently the largest healthcare industry data breach, Hospital Corporation of America (HCA) has confirmed the theft of 11 million patient records. HCA, one of the country's most prominent healthcare providers, believes the breach originated from an external storage system used for email automation. more
The Internet Corporation for Assigned Names and Numbers (ICANN) is a not-for-profit corporation, which essentially functions as a governing body for the Internet and brings together representatives from government, civil society, academia, the private sector, and the technical community. Despite its importance in crafting policies related to world wide web development, a significant portion of digital rights lawyers underestimates ICANN’s regulatory role in contrast to one of the national governments. more
ICANN plans to announce the long-anticipated list of applied-for domain names under its new generic Top-Level Domain (gTLD) program tomorrow. The announcement will be made in London at 12:00PM and streamed live on ICANN's website. ICANN has received over 1,900 applications from around the world. more
When in March 14, 2014, the NTIA announced its intention to step away from its historical oversight role over the IANA functions, something extraordinary happened. A global dialogue immediately ensued. The first part of this dialogue is expected to come to an end in the forthcoming ICANN annual meeting in Marrakech next week. After two years of vigorous discussions, the Internet community says it is now ready to move to the next part of the process - implementation. more
On November 16, the Republican Study Committee, a caucus of conservative Republican members of the U.S. House of Representatives, inadvertently released a policy brief entitled "Three Myths About Copyright Law" which was quickly withdrawn. Of course, as a work of the U.S. government, this document does not itself enjoy copyright protection, so it is widely available on the internet through groups like The Internet Archive project. more
There has been a lot of discussion lately about the potential for IPv6 to create security issues. While there are definitely some security risks of IPv6 deployment, a carefully considered implementation plan can help mitigate against security risks. As we approach World IPv6 Launch tomorrow, I thought it prudent to share the below described incident that iDefense recently observed. more
The "Paris Call for Trust and Security in Cyberspace," announced by French President at the Paris Peace Forum on November 13, has attracted more than 450 signatories. more
The Internet is evolving far beyond screens and smartphones. A proposed seven-stage framework anticipates a future shaped by autonomous agents, sensory wearables, global connectivity, and quantum networks redefining how humans interact with the digital world. more
In the winter of 2014 I wrote a blogpost under the title 'Luddites of the 21st century unite?' (read here). In the post I wondered where the 21st century Luddites were. ICT, automation, artificial intelligence all threatened jobs, yet all those affected embraced smartphones and the Internet in droves. It seems I found them, but what to do? Brexit and Luddites Fast forward to early summer 2016. more
How can our threat intelligence platform deliver more? This is a question many business professionals employing threat intelligence practices are asking themselves as their companies continue to fall short against the machinations of modern-day cybercriminals. The truth is that while threat intelligence is certainly not a silver bullet, organizations often make a mistake when they opt for a platform without considering several important factors that can help them evaluate the market better and deploy the practice more effectively. more
"Pai, a Barack Obama nominee who has served as the senior FCC Republican for more than three years, could take the new role immediately and wouldn't require approval by the Senate because he was already confirmed to serve at the agency," Alex Byers and Tony Romm reporting in Politico. more
Japan's cybersecurity minister, Yoshitaka Sakurada, 68, who recently stated he doesn't use a computer, also admitted on Thursday to a parliamentary committee that he's not very familiar with the whole cybersecurity field. more
Private or public? Both cloud types offer benefits and both have enjoyed significant growth over the last few years. Yet, what's the best bet for your business: The virtually limitless resources of public cloud stacks, or the close-to-home control of private alternatives? Here's a look at some critical differences between public and private clouds... more