/ Most Viewed

New Zealand’s Top-Level Domain Manager Seeking New Registry Service Provider for .nz

The manager for .nz announced today that they have launched a registry replacement process and are calling for expressions of interest from potential service providers by November 29th. more

Ethical Hacking: Turning The Tables to Boost Cyber Security

Hacking remains a huge problem for businesses. As noted by MarketWatch, more than 175 data breaches have already happened this year, and in 2015 approximately 105 million adults in the United States had their personal information stolen. For companies, the stakes are huge: Compromised systems not only damage the bottom line but can severely impact public opinion. more

The Death of Millimeter-Wave Cellular?

Apple recently announced that it is not building millimeter-wave spectrum antennas into the next generation SE iPhone. Interestingly, this is a phone sold by Verizon, which spent a year advertising on TV and showing us speed tests on cellphones that were receiving gigabit speeds. more

UK Announces £100 Million in Funding to Help the Nation Build and Adopt the Next Generation of ‘Sovereign’ AI

The UK's Foundation Model Taskforce has been established in response to the UK government's ambition to become a leader in the development and use of artificial intelligence (AI). The task force will be supported by £100 million of investment and will focus on building the UK's 'sovereign' national capabilities, so public services can benefit from the transformational impact of this type of AI. more

More Evidence Why Doing Good Pays Off and Love Doesn’t

The new gTLDs program can't succeed unless two things happen. The approved registries must do good, and ICANN must weed out applicants who are in love. This is to say that registries should put users' good first, and applicants shouldn't get the nod unless their motive is economic and/or social viability. A recent study reveals that leading companies have enjoyed healthy profits because they made doing good their strategic foundation. more

BT Announces 500Mbps to 1000Mbps Broadband Rollout to UK Homes

British Telecom has announced its plan to transform the UK broadband landscape from superfast to ultrafast. The company says it plans to deliver much faster broadband for homes and small businesses via a widespread deployment of “G.fast” -- a technology the company will test in two pilot locations starting this Summer. G.fast is aimed to help BT deliver ultrafast speeds of up to 500Mbps to most of the UK within a decade. Deployment will start in 2016–2017, subject to the pilots being successful, BT says. more

Scientists Transmit Terabits Per Second Through Air, May Replace Undersea Cables

Scientists from ETH Zurich and their European partners have demonstrated a groundbreaking capability for transmitting several tens of terabits per second, despite considerable air turbulence. This feat was accomplished with lasers over a distance between the Jungfraujoch mountain peak and the city of Bern in Switzerland. The technology could potentially eliminate the need for expensive undersea cables, currently forming the backbone of the Internet. more

The Ageless Warning of Icarus

It wasn't that long ago that, during a visit home, my brother asked me, "Why are you so stuck on this Internet thing?" His direct question caused me to realize that I had never actually stopped and considered why I was investing so much time – and in such a highly visible manner – into Internet governance when I wasn't being compensated for doing so and, in fact, was – not putting too fine of a point on it – flat broke. more

Security and Reliability: A Closer Look at Vulnerability Assessments

Building on my last article about Network Assessments, let's take a closer look at vulnerability assessments. (Because entire books have been written on conducting vulnerability assessments, this article is only a high level overview.) What is a vulnerability assessment? more

In Search of an Agenda for a New Netmundial

With the strong possibility of a new Netmundial-style event being organized under the stewardship of CGI.br in 2024, the Internet governance community ought to reflect upon the benefits that this could bring to all stakeholders. In a scenario of uncertainty over the several processes affecting the future of the global network, there is value in taking another look at the original event's collaborative outcomes document, which summarized much of what was then understood to be core principles of Internet governance. more

Deadline TOMORROW to Apply to Represent the “Technical Community” at the Brazil Meeting and in 1Net

Are you interested in being a representative of the "technical community" to the "Global Multistakeholder Meeting on the Future of Internet Governance" happening in April 2014 in Brazil? Or would you like to represent the technical community on the "1net Steering Committee" that is guiding the future of the 1net initiative? If so, THE DEADLINE IS TOMORROW, Friday, January 10, 2014, to submit your expression of interest in being considered for a role on those committees. more

ICANN 53 - Guaranteeing Accountability in Internet Governance

I recently attended the Internet Corporation for Assigned Names and Numbers' (ICANN) 53rd meeting in Buenos Aires to further discuss the Internet Assigned Numbers Authority (IANA) transition process. During the meeting, public and private Internet stakeholders made important strides on a transition timeline, accountability planning and future management of the Internet that supports global creativity and innovation. more

WannaCry Ransomware Cyberattack Spreading to Countries Across the World, 45K Attacks Reported So Far

Security researchers are reporting a massive attack today, dubbed "WannaCry", which has reached 45,000 attacks in 74 countries around the world so far, mostly in Russia. more

Why Attribution Is Important for Today’s Network Defenders

It makes me cringe when I hear operators or security practitioners say, "I don't care who the attacker is, I just want them to stop." I would like to believe that we have matured past this idea as a security community, but I still find this line of thinking prevalent across many organizations -- regardless of their cyber threat operation's maturity level. Attribution is important, and we as Cyber Threat Intelligence (CTI) professionals, need to do a better job explaining across all lines of business and security operations... more

Identifying Spam: MAAWG’s Latest Documents Improve Accuracy of Reputation Systems

The Messaging Anti-Abuse Working Group (MAAWG), of which Return Path (my employer) is a very active participant, met recently in Heidelberg, Germany. Among other exciting projects, they finished two new best practices documents which have been lauded in the press as a big step towards stopping botnet spam... more