/ Most Viewed

Policy Advisory Board Model Now a Test of Multistakeholder Model

In early November 2013, prior to ICANN's Buenos Aires meeting, I published an article at this forum, Policy Advisory Boards – A Cornerstone PICS (Public Interest Commitment Specification), that extoled the advantages of adopting a Policy Advisory Board (PAB) model as a practical, effective, and least burdensome means of effectively implementing the request of ICANN's Governmental Advisory Committee (GAC) for consumer and competitive safeguards at sensitive new gTLD "strings" - especially those that are related to regulated industries and professions. It is deeply gratifying that the article has received nearly 9,000 views since first being posted and inspired considerable discussion. more

ICT Sectors Are Merging Into a New Wholesale Platform for the Networked Economy

There certainly is a lot of interest in the IoT (personal devices) and M2M (industrial applications) market. But what we are seeing is only what is happening on the surface. Most of the IoT and M2M activities are taking place unseen. For example, all new electronic devices (smartphones, tablets, set-top boxes, game consoles) are now IoT devices. Wearable technology has also become a thriving part of the IoT industry, with an ever-broadening range of possible uses and devices, including smart watches, glasses, clothing items, skin patches, and even implants for health monitoring. more

A Look at How the Internet Routes Around Damage: Measuring Global Effects of Storm Sandy

Hurricane Sandy caused major damage in both the Caribbean and the North-Eastern part of the USA. In an earlier article (RIPE Atlas - Superstorm Sandy) we showed data on 15 RIPE Atlas probes that are located in or near the affected areas in the USA. Most of these locations now appear to be back to normal round trip times to targets we monitor. But the effects of Hurricane Sandy were felt beyond the immediately affected area. more

The IETF’s *Other* Diversity Challenge: An Update

Last June I wrote an article titled "The IETF's Other Diversity Challenge" where I discussed the positive steps the Internet Engineering Task Force (IETF) is taking to increase the diversity of its participants and raised a potentially overlooked demographic: Network Operators. That essay was a problem statement of sorts, and I was long ago taught that you should only raise problems that you have a solution for, or are at least willing to help solve. more

The CEO Is Not Who They Seem: Deepfakes Target Corporate Trust

A surge in AI-generated deepfake scams is reshaping the cybersecurity threat landscape, with fraudsters now impersonating company executives to deceive employees and siphon off millions. more

Why Domain Name Security Matters Most?

In my recent CircleID post, DNS, Domain Names, and Certificates: The Missing Links in Most Cybersecurity Risk Postures, I highlighted the importance of applying multiple layers of defense to secure these business-critical assets. Last Friday, Brian Krebs, the world-renowned cybersecurity journalist, reiterated the criticality of domain name security because the domain name "e-hawk.net" was stolen from the rightful owner using social engineering tactics targeting its domain name registrar. more

Sopho’s Threat Report Focuses on Social Network Spam

The latest Sophos Threat Report shows an upward trend in spam and identity theft through social networks. One of the examples Sophos gives is Facebook. In general Sophos claims that from 2009 to 2010 the spam, phishing and malware containing messages all doubled. more

Trademark Protection Dust-Up Obscures the Potential Value in New gTLDs

As a member of ICANN's Business Constituency I have heard first-hand the perfectly appropriate criticisms from trademark holders of ICANN's roll-out of new generic Top-Level Domains (gTLDs). But while it may be OK for branded companies to wish they didn't have to deal with the matter, the dust that has been kicked up has obscured real value in the program. more

Designing Secure Networks with Cisco Technology, Part 2

In this multipart series I will be presenting some of the leading industry-standard best practices for enterprise network security using Cisco technologies... In Part 1 of this series, I provided an overview of the critical role that properly designed data security architectures play within an Internet-connected organization. Before we begin to discuss the security designs, processes and recommendations related to Cisco technology, let's first discuss some of the ways a network becomes unsecure... more

Belarus-Linked Hackers Target Diplomats, Likely With State Support

Foreign diplomats based in Belarus have been under the digital crosshairs of hackers with suspected ties to the Belarusian government for nearly a decade, security researchers revealed on Thursday. more

An Economic Outlook on Information Security

As enterprise information security spending is scrutinized in unprecedented fashion in 2009 Information Technology management will seek to get more for their security dollar. While budgets tighten and risks grow due to the global economic downturn IT departments will be looking for point solutions, not suites of security tools. more

Cyber Criminals Infiltrate Even Small Businesses

I read an interesting article in the Wall Street Journal today entitled Cyber Criminals Sniff out Vulnerable Firms. It's a story of a small business owner in New York whose company was broken into by cyber criminals and stole $1.2 million from its bank accounts, although the owner was able to later recover about $800,000 of that. The moral of the story is that small businesses feel like they are not a major target for online thefts like these. more

Cybercriminals Shifting Focus From Windows PCs to Other Systems and Mobile

In a major cybercrime turning point, scammers have begun shifting their focus away from Windows-based PCs to other operating systems and platforms, including smart phones, tablet computers, and mobile platforms in general, according to the Cisco® 2010 Annual Security Report, released today. The report also finds that 2010 was the first year in the history of the Internet that spam volume decreased, that cybercriminals are investing heavily in "money muling," and that users continue to fall prey to myriad forms of trust exploitation. more

How Global Trends Arising from COVID-19 May Influence Online Brand Protection Strategies

We're in an interregnum where society has paused, and there's no telling how things may turn. In such times of crisis, we are the explorer; exploring the uncharted waters of change, where dangers and opportunities lie. How the pandemic caused this greater societal change may not be something that an individual can alter, we may, however, take the helm and navigate. more

Kentucky and the Gambling Domains

A recent law suit in Kentucky has attracted world-wide attention because it could create a very dangerous precedent – the application of local law to the domain name system and Internet web sites that are available globally... Even though the Kentucky case only involves Kentucky gambling laws, the dangerous precedent is that regimes around the world with oppressive local laws restricting speech or religion might attempt similar litigation. more