/ Most Viewed

BP and Incident Response: How Well Do Oil and Security Mix?

BP and the Oil Industry are taking a lot of heat these days - much of it rightly so. Moving beyond the drama and evaluating the overall response of BP and others reinforces much of what is taught in incident response training and preparation... by showing the outcomes when one does not respond well. This is probably the most important incident that the responders involved will deal with in their professional lives. For those of us working to protect Internet Infrastructure and resources there are useful lessons as we consider what is happening in the Gulf of Mexico and their response effort. more

The Internet Access Gap Survey: Right Conclusion, Wrong Numbers

A colleague sent me a story by Cecilia Kang in the Washington Post: Survey finds gap in Internet access between rich, poor students. With my interest in programs to get connected computers into low income households, my friend knew I would be interested in the article which talks about a survey released Thursday by the Pew Research Center. Indeed, I would commend the Washington Post article and the survey itself to you for reading. I want to highlight the problem representing the survey results in the Washington Post. more

Hassle Over LEOs

Every second, 4.5 billion people using computers and other electronic devices send 100,000 gigabytes of information to each other. Around 60% of the world's population has an Internet connection. North America and Europe have penetrations of 95% and 87%. But Asia and Africa do not yet get beyond 54% and 40%. On those continents, there are many remote areas where there is no Internet yet. At least no affordable Internet. more

ICANN Takes a Wrong Turn on New TLD Contracts - “Post Signature Revision Process?”

The pen is mightier than the word...or should be. When ICANN Chairman Peter Dengate-Thrush --­ an accomplished attorney -- said last year that he wouldn't let one of his own clients agree to a contract that could be unilaterally changed after it was signed, the Internet community breathed a sigh of relief. But when the Chairman backed away from that stance earlier this week in Nairobi, it became clear that we should have held our breath a little bit longer. more

The IG Marathon, Who Will Win the Internet Governance Race

2015 has already started to make its own land marks in the internet of things world. A major thing that has definitely hit the headlines is cyber security issue, which gives an indication that organizations will probably have to make generous budgetary allocations to answer to these anticipated breaches. Internet governance is perhaps going to remain in the headlines for the rest of 2015. more

Russia to Disconnect Entirely From the Internet as Part of Cyber-Defense Measure

According to various news outlets, Russia is reported to be planning a complete Internet shut down, as part of a test of its cyber-defenses. more

If Thou Be’st as Poor for a Subject as He’s for a King…

Way back in 1995, Wired reporter Simson Garfinkel gave Jeff Slaton the name "Spam King." Less than a year later, Sanford Wallace earned the title -- and soon had to share it (and his upstream provider) with Walt Rines. Others have come and gone; Sanford and Walt reappear every few years, together or separately, only to be sued away again... it seems as if any spammer noticed by law enforcement is immediately crowned "the Spam King," even when there are multiple such crownings happening at the same time. more

Google Spent $7.3 Billion on Data Centers in 2013, Double Its 2012 Spending

Rich Miller reporting in Data Center Knowledge: "Google continues to pump big bucks into its data center operations, investing a massive $7.35 billion in capital expenditures in its Internet infrastructure during 2013. The spending is driven by a massive expansion of Google's global data center network, which represents perhaps the largest construction effort in the history of the data center industry." According to company's reported capital expenditure, total spending adds up to $7.35 billion - more than double the $3.27 billion in CapEx the company reported in 2012. more

ICANN Accountability Progress Made in Second CCWG Draft Proposal

The December 21 deadline for submission of public comments on the latest CCWG-Accountability draft proposal is quickly approaching. In this second draft of the proposal, great strides have been made toward addressing the accountability issues that members of the community have raised (notably, Lawrence Strickling's recent remarks). As I have previously emphasized, any plan to ensure the accountability of the ICANN Board of Directors must be closely scrutinized before ICANN pursues its implementation. more

Court Case Serves as a Good Reminder as to the Perils of Marketing Through Text Messages

A court in Illinois rejected a motion to dismiss case filed by defendants in a class action brought on behalf of plaintiffs who received SMS spam marketing for an animated film called "Robots". The court's ruling is not surprising, given the other cases which have come to a similar conclusion. more

Trusted Notifier Arrangements Require Trust: Why Unpacking Misunderstandings Around Trusted Notifiers Is Important for Dealing With DNS-related Abuse

Domain Name System (DNS) Operators (Registries and Registrars) receive notices asking them to take action on a wide range of alleged technical and content-related abuses. However, there is a fundamental question of when it is appropriate to act at the DNS level and the evaluation of whether the alleged abuse meets a sufficient threshold for action at the DNS level. Additionally, given the volume of abuses occurring on the internet, existing resources, mechanisms, and protocols available in-house to Operators are in many cases insufficient to address abuses in a timely fashion. more

Reaction: Do We Really Need a New Internet?

The other day several of us were gathered in a conference room on the 17th floor of the LinkedIn building in San Francisco, looking out of the windows as we discussed some various technical matters. All around us, there were new buildings under construction, with that tall towering crane anchored to the building in several places. We wondered how that crane was built, and considered how precise the building process seemed to be to the complete mess building a network seems to be. more

Shadow Regulations and You: One More Way the Internet’s Integrity Can Be Won

Even those who care about net neutrality might not have heard of the aptly-called Shadow Regulations. These back-room agreements among companies regulate Internet content for a number of legitimate issues, including curbing hate speech, terrorism, and protecting intellectual property and the safety of children. While in name they may be noble, in actuality there are very serious concerns that Shadow Regulations are implemented without the transparency, accountability, and inclusion of stakeholders necessary to protect free speech on the Internet. more

Celebrating 35 Years of the DNS Protocol

In 1987, CompuServe introduced GIF images, Steve Wozniak left Apple and IBM introduced the PS/2 personal computer with improved graphics and a 3.5-inch diskette drive. Behind the scenes, one more critical piece of internet infrastructure was quietly taking form to help establish the internet we know today. November of 1987 saw the establishment of the Domain Name System protocol suite as internet standards. more

Internet Visionaries Honored with Postel Service Award

The Internet Society has announced the 2024 Jonathan B. Postel Service Award recipients, honoring Steve Crocker and Xing Li for their pioneering work in advancing the global Internet infrastructure. more