Distributed Denial of Service is a big deal -- huge pools of Internet of Things (IoT) devices, such as security cameras, are compromised by botnets and being used for large scale DDoS attacks. What are the tools in hand to fend these attacks off? The first misconception is that you can actually fend off a DDoS attack. There is no magical tool you can deploy that will allow you to go to sleep every night thinking, "tonight my network will not be impacted by a DDoS attack." more
In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies. Each article in the series will cover a different aspect of security technologies and designs and how each can be deployed in the enterprise to provide the best security posture at the lowest possible budgetary and administrative cost. In Part 2 of this series I discussed security risks and vulnerability. In this article we begin to focus on the role Cisco network and security technologies play in ensuring the safety and security of network data. more
The African Union's Convention on the Establishment of a Credible Legal Framework for Cyber Security in Africa (AUCC) has been the focus of debate recently.To shed light on online security issues in Africa, CIO East Africa sought the views of Ms Sophia Bekele, an internet security expert and international policy advisor over internet and ICT. more
I still run across articles that extol the supposed wonders of 5G. The most recent, published in Gizmodo asks "How 5G Could Replace Your Home Broadband Connection". I was surprised to see an article like this in a tech-oriented site because the article gets most of the facts wrong about 5G - facts that are not hard to verify. This article talks about 5G having "faster download speeds, faster upload speeds, more bandwidth, and lower latency" than landline broadband. more
ICANN is currently analyzing technical and policy implications regarding the introduction of Internationalized Top-Level Domains into the root. This is an important step in the continued evolution of the Internet by enabling language communities of the world that write non-Latin and extended Latin scripts to utilize their languages on the Internet... While the IDNC Working Group (IDNC) has made constructive progress on proposing a framework for the introduction of an initial set of IDN TLDs, the approach taken by the IDNC from a legal perspective is fundamentally flawed. more
Coninsiding with October Cybersecurity Awareness Month, Google today announced the launch of Advanced Protection Program specifically "designed for those who are at an elevated risk of attack." more
Denial of service attacks have been around since the Internet was commercialized and some of the largest attacks ever launched relied on DNS, making headlines. But every day a barrage of smaller DNS-based attacks take down targets and severely stress the DNS ecosystem. Although DNS servers are not usually the target of attacks they are often disrupted so attention from operation teams is required. There is no indication the problem is going away and attackers continue to innovate. more
The broadband sector, like the wireless sector, is one of the strongest growth areas of telecommunications. Unlike most OECD countries, where DSL tends to dominate, the majority of subscribers in the US fixed broadband market are cable subscribers. During 2010 the gap continued to widen as the cable companies accounted for 70% of new broadband subscribers compared to the telcos' 30%. Although new broadband networks such as FttH and WiMAX are being widely deployed, broadband competition in each region is still generally limited to one DSL and one cable operator. more
On February 2nd ICANN staff announced the release of a Draft Report: Rights Protection Mechanisms Review that is open for public comment until May 1st. This Draft Report is preliminary to an Issues Report requested by the GNSO Council that is due to be delivered by September 30th, and that may set the stage for a Policy Development Process (PDP) on Rights Protection Mechanisms (RPMs) that could commence in 2016. Such a PDP could consider comprehensive reform of these RPMs as well as of the Uniform Dispute Resolution Policy (UDRP). more
The governor of Colorado recently signed a new anti-spam law [PDF] into effect. Since CAN SPAM draws a tight line around what states can do, this law is mostly interesting for the way that it pushes as firmly against that line as it can. Other observers have already done a legal analysis of the way it's worded to avoid being tossed out as the Oklahoma law was in Mummagraphics, and to make it as easy as possible for suits to meet the falsity or deception limits in CAN SPAM. To me the most interesting part of this law is its one-way fee recovery language... more
"Three years after Mirai first appeared, and two years after WannaCry, it shows that we still haven't solved the problems leveraged in those outbreaks," said F-Secure Principal Researcher Jarno Niemela. more
A couple of weeks ago, I blogged about the importance of the timeline leading up to the September 2015 deadline for the IANA oversight transition proposal. In that post, I explored the nature of U.S. politics and how it can affect the transition if we, as a community, are not diligent in our efforts to meet that deadline. Since then, the IANA Stewardship Transition Coordination Group (ICG) has held its first meeting and a conference call, resulting in some new information that necessitates an update to that post. more
IBM published a video where it predicts what the world will look like in 2016 (see bottom of this post for the link). It includes the following five predictions. I want to start with the last one -- that junk mail (i.e., spam) will disappear. You'll need to watch the video to get the nuances of the prediction, but IBM says that in five years, Junk Mail will become a thing of the past. more
I'm often baffled by lawsuits over domain names and keywords because they just don't seem to make any economic sense. This lawsuit is especially perplexing given the plaintiff's delays and the seeming impossibility of the plaintiff reaching a profitable outcome, even if it won in court. What was the plaintiff thinking? more
Unlike traditional attacks by hackers which breach a business's security systems, resulting in defaced websites, intellectual property theft and/or customer data theft, a DDoS attack focuses on making a business's Internet connected infrastructure (e.g. web servers, email servers, database servers, FTP servers, APIs, etc.) unavailable to legitimate users. A business's brand reputation, which can take years to establish, can be swept away in just a few hours from a single DDoS attack in the same way a natural disaster like a flood or earthquake can impact a traditional brick and mortar business. more