/ Most Viewed

NSA Takes a Leadership Seat at the Global 5G Security Table

It has been a long time coming. In the world of global 5G security, there is only one principal forum. The somewhat cryptically named 3GPP SA3 is dedicated to 5G security and holding its 103rd meeting electronically next week from 17 to 28 May with 772 submitted documents and 189 participants registered. SA3 meets every 60 days and exists at the security center of an ecosystem of numerous technical groups encompassing many hundreds of companies, industry organizations, and government agencies worldwide. more

Multi-Stakeholder Debate at the IGF: Lessons from a Safari

Here at the IGF in Kenya, we're debating how governments, private sector, and civil society can improve the multi-stakeholder model that's helped the Internet become such a vital part of life around the world. Makes me think of another kind of multi-stakeholder model I saw last week on a photo safari in Kenya's Masai Mara National Reserve. more

ICANN and the Data Quality Act: Part III

This is the third part of a multi-part series reported by ICANNfocus. In this part, the focus is on how ICANN implementation of the Data Quality Act would address congressional concerns. "Congress is deeply concerned by ICANN's management and is demanding meaningful change in how the organization governs the internet. Congressional concerns regarding ICANN and Congressional oversight activities were detailed in Part II of this series." more

China Temporarily Cuts Itself Off from the Global Internet

China briefly disconnected from much of the global internet for over an hour on Wednesday, following a disruption traced to the country's "Great Firewall." According to activist group Great Firewall Report, the outage began at 12:34 a.m. Beijing time and lasted until 1:48 a.m. on August 20. more

Strange Email Used to Inform Marriott Customers About the Massive Data Breach

Millions of email warnings were sent out by Marriot on Friday to warn customers about the massive data breach which has affected close to half a billion guest data. more

IPv6 Will Change the Face of Email Filtering, Says Report

Data solutions provider Return Path has released a new report highlighting 20 visionary ideas for brands to "futureproof" their email program. Among various insights, the report warns brands that adoption of IPv6 will result in rising dependency on domain-based reputation. more

Monumental Cybersecurity Blunders

Two recent celebrated cybersecurity standards history events brought together sets of people who were intimately involved with some of the most significant network security standards work ever undertaken. These included the X.509 digital certificate standards at ITU X.509 Day, and the Secure Digital Network System (SDNS) standards at the NSA Cryptologic History Symposium 2022. more

Avoiding an ICANN Monopoly on Policy

With all the focus in the TLD world on the imminent arrival of more than a thousand new TLDs and the still unfinished discussions within ICANN on what policy framework those TLDs will need to follow, it is often forgotten that there are hundreds of other TLD policy frameworks that are mature, stable and well tested. These of course are the ccTLD policy frameworks that have been actively developed over 20 years. more

Client-based WDS: Providing Application Acceleration in Mobile and VPN Environments

Wide-Area Data Services (WDS), aka "WAN Optimization" is becoming the most effective way to improve application performance while reducing network traffic. In scenarios where there is significant network latency that would otherwise render many applications unusable, WDS can deliver almost LAN-like speed. Where bandwidth constraints exist and there is no practical or economical option, WDS can help reduce network traffic, allowing you to postpone or avoid circuit upgrades altogether. The technology provides the ability to centralize applications and servers, furthering the cost savings on hardware, software licensing, maintenance and the operation of a distributed architecture. more

Cyber Resilience Resources Restructuring

Information and Communications (ICT) infrastructures rely on many globally shared critical resilience information resources for diverse essential functions such as identifiers, routing, and cyber security. However, this ICT ecosystem has rapidly become significantly less stable and collaborative with dramatically diminished respect for legal norms and values because of the new USA national Administration. The instability includes the vicarious, wholesale removal of essential public safety and scientific databases, as well as global collaboration with multiple global UN public safety bodies. One result is the scaling of Digital Sovereignty initiatives. more

P2P: Boon, Boondoggle, or Bandwidth Hog?

Depending on whom you ask, peer-to-peer (P2P) services may be the best thing that ever happened to the Internet or a diabolical arbitrage scheme which will ruin all ISPs and bring an end to the Internet as we think we know it. Some famous P2P services include ICQ, Skype, Napster, and BitTorrent. Currently a new P2P service called iPlayer from BBC is causing some consternation and eliciting some threatening growls from British ISPs... more

First Private Auction for New Generic Top Level Domains Completed: 6 gTLDs Valued at Over $9 Million

On behalf of Innovative Auctions, I am very happy to announce that we've successfully completed the first private auction for generic Top Level Domains (gTLDs). Our auction resolved contention for 6 gTLDs: .club, .college, .luxury, .photography, .red, and .vote. Auction winners will pay a total of $9.01 million. All other participants will be paid from these funds in exchange for withdrawing their application. more

The “Internet of Things,” the Internet and Internet Governance

As the second Internet Governance Forum approaches, it is an appropriate moment to take stock of how the Internet Governance dialogue has evolved since the conclusion of the WSIS Summit in 2005. One year after the first IGF in Athens, it is clear that government, industry and civil society stakeholders are still grappling over the direction and focus of the IGF... There is little doubt that some governments will choose to borrow concepts from the IGF when developing law and policy and will ultimately apply them to the Internet within their respective jurisdictions. Given the global nature of the Internet, this should be a fundamental concern. While this important dialogue about the Internet continues at the IGF in Brazil next month, another no less important debate is emerging with regard to RFID technology and the so-called "Internet of Things." The Internet of Things is a term coined to describe a future ubiquitous sensor network that collects commercial and personal data in public and private settings created, in part, through the rollout of RFID technology... more

Turning the Tide of Online Scams: Interview With Prof. Jorij Abraham, Global Anti-Scam Alliance

Professor Jorij Abraham has been a part of the international eCommerce community since 1997. From 2013 -- 2017, he has been Director of Research & Advise at Thuiswinkel.org (the Dutch Ecommerce Association) and the European Ecommerce Association with 25.000+ members in 20 countries. He is now Managing Director of Global Anti-Scam Alliance, whose mission is to protect consumers from getting scammed. He is also e-commerce professor at the University of Applied Sciences, TIO. more

Lessons Learned from Harvey and Irma

One of the most intense natural disasters in American history occurred last week...You may wish to donate or get involved with hurricane Harvey relief to help the afflicted. That's great, but as we all know, we should be wary of who we connect with online... The FTC warned last week that there are many active relief scams in progress and noted that there always seems to be a spike in registration of bogus domains. more