/ Most Viewed

US Ramping Up to Defeat Terrorism Online

Obama administration is ramping up its efforts to fight terrorism -- "How the US is working to defeat ISIS online" Kristina Wong reprots today in the Hill: "Driving the effort is the recently set up Global Engagement Center, housed at the State Department but led by retired Navy SEAL Cmdr. Michael Lumpkin, a former top Pentagon official." more

UK Raises Cybersecurity Spending to $2.3 Billion

Britain's finance minister on Tuesday announced government's new five year National Cyber Security Strategy, almost doubling the funding from its 2011 plan to 1.9 billion-pound ($2.3 billion). more

Stronger Pro-Growth International Policies Are Needed for the Internet, Says ICC

The International Chamber of Commerce (ICC) has announced that greater efforts to bring about better, more consultative global policy-making are needed to maximize the potential of the Internet to power future economic growth. ICC BASIS (Business Action to Support the Information Society) plans to use its presence at the 8th annual Internet Governance Forum (IGF), taking place in Bali, Indonesia, between 22-25 October, to call for attention to a greater collaboration between stakeholder groups and stronger pro-growth international policies in order to help the Internet retain its place as the world’s primary economic enabler. more

How to Restore Trust Into Cyberspace? Beer Has the Answer!

Let's face it, when it comes to digital technologies, fundamental human rights are not on top of the digital agenda. They seem irrelevant and remote, even an obstacle to digital innovation and opportunities. We are quick to pay lip service to them, but we permit the profit motive and stakeholder self-interests to override human rights principles. It does not matter how right and righteous the cause might be; to be implemented, it must be profitable or carry stakeholder benefits. more

Reprot Suggests China Hacked High-Level Officials at Federal Deposit Insurance Corporation

The former chairman, chief of staff and general counsel of the agency were all infiltrated. more

Entering the Growing IPv4 Market: What Enterprises Should Do Now

With IPv4 addresses fetching up to $30 apiece and IPv6 adoption lagging, companies may be sitting on hidden digital assets. A strategic audit could unlock unexpected revenue and enhance long-term infrastructure planning. more

Would the “Mensch” in the Room Please Stand Up!

Wolfgang Kleinwaechter, in his Internet Governance Outlook 2024, reminded us that 2024, as the years before and future years, will be pivotal for Internet Governance processes. We eagerly await Wolfgang's missives every January, and we trust what we read because we know him, and we trust CircleID. We should be grateful and cherish this example of straightforward, digitally enabled, and trust-based human communication... more

Broadband Benefitting US Households by Over $30 Billion Annually, According to Study

According to a recent study, broadband Internet access is now considered by many US households a necessity and they turn to broadband Internet during recession. The study released by Jonathan Orszag, Robert Willig, and Mark Dutz suggests that with $32 billion gains in 2008, consumers increasingly benefit from using broadband at home. "Once people get a taste of the entertainment, educational opportunities, social networking and everyday services that broadband access facilitates, they grasp the immense value it can add to their lives as a powerful tool, regardless of where they come from," said Co-Chairman of the Internet Innovation Alliance Bruce Mehlman. "Once a broadband user, always a broadband user." more

Legacy or Not to Be?

Over the years, most communication service providers will build up their information systems bit by bit. Every so often as new services are required, a new process and vendor product is installed. Several years later, there can be many legacy processes and vendor products chosen and designed by many different people. Generally, each implementation team is diligently aware of these legacy processes and vendor products. But in a lot of cases the whole enterprise architecture becomes very convoluted and complicated. more

Is Zoom’s Server Security Just as Vulnerable as the Client Side?

Zoom programmers made elementary security errors when coding, and did not use protective measures that compiler toolchains make available. It's not a great stretch to assume that similar flaws afflict their server implementations. While Mudge noted that Zoom's Windows and Mac clients are (possibly accidentally) somewhat safer than the Linux client, I suspect that their servers run on Linux.Were they written with similar lack of attention to security? more

British Banks Not Fully Reporting Cyber Attacks, Fear Punishment, Bad Publicity

"Britain's banks are not reporting the full extent of cyber attacks to regulators for fear of punishment or bad publicity, bank executives and providers of security systems say," reports Lawrence White in Reuters today. more

African SMEs Are Paying the Price for Global Digital Policy Blind Spots

Global digital policy frameworks often overlook the realities of African SMEs, imposing compliance standards shaped by mature economies and infrastructure, thereby constraining innovation, competitiveness, and inclusion in the digital economy. more

The Geopolitical Protocol: Can QUIC and LEO Satellites Mitigate the Risks of Fragile Subsea Cables?

As geopolitical tensions expose the fragility of subsea cables, Low Earth Orbit satellites and the QUIC protocol promise a more resilient internet by diversifying routes, preserving session continuity, and redefining control over global data flows. more

Re-Booting Internet Governance: Resurgence of Ideas and Proposals

Milton Mueller reporting at IGP: At the recently concluded Seoul Conference on Cyberspace, a memo was circulated calling for the creation of a "Commission on the Future of Internet Cooperation." The commission, the confidential memo said, would consist of "civic leaders, ministers, CEOs and technical pioneers." Its purpose will be to "provide new ideas for transnational and multistakeholder proposals for Internet governance." According to the leaked document, the group is supposed to begin work in October and conclude its work with a presentation at the World Economic Forum in January 2014. more

When the Registry Itself Is Contested: The Unseen Geopolitical Risk in the 2026 gTLD Round

As the 2026 gTLD round opens, applicants face an overlooked geopolitical hazard: what happens if the registry or RIR underpinning their domain collapses under sanctions or war, leaving contracts stranded and accountability elusive. more