"China Sets New Tone in Drafting Cybersecurity Rules," By Eva Dou in Beijing and Rachael King in San Francisco reporting in the Wall Street Journal. more
A research paper commissioned by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND) suggests that nuclear command and control systems are vulnerable to cyber terrorism. "Despite claims that nuclear launch orders can only come from the highest authorities, numerous examples point towards an ability to sidestep the chain of command and insert orders at lower levels," says the report. more
When ISOC, PIR and Ethos announced the sale in November they hoped for a quick transaction. PIR CEO Jon Nevett announced the same week that PIR would be going on a buying spree. This was optimistic. Six months, if at all, is now the more likely outcome. How many times in recent history have companies surprised stakeholders with their best-laid plans, only to discover we no longer live in a world where business has free reign. The glory days of the 2000s died with Lehman Brothers. more
Security expert Bruce Schneier in a blog post today writes: "It's about who is in charge of cyber security, and how much control the government will exert over civilian networks. And by beating the drums of war, the military is coming out on top. ... General Keith Alexander, the current commander of the U.S. Cyber Command, hypes it every chance he gets. This isn't just rhetoric of a few over-eager government officials and headline writers; the entire national debate on cyberwar is plagued with exaggerations and hyperbole." more
CTIA, the trade association for cellular companies, published a recent blog titled, "The Looming Spectrum Crisis". The blog quotes a study from Accenture that concludes that a lack of spectrum for 5G is reaching a point of crisis. The Accenture study says that cellular networks will be unable to meet nearly one-fourth of peak-period requests for connection as soon as 2027. more
The internet started to take on momentum in the 1990s. At that time many analysts, myself included, marveled at the opportunity of creating a platform that would boost grassroot democracy. There was no need for a middleman and there were few barriers to ordinary people becoming involved. This included organizing groups, discussions and events, sharing knowledge, insights and information, publishing opinions -- just some of the potential attached to the internet. more
The digital realm is bursting with data. The buzz words of today are "big data," and I know you've heard them. There's a reason why. It can boost business in extraordinary ways. But how? Let's first look at what exactly big data is: enormous collections of information developed either internally from the company itself or from a vast array of new media. At times, this data is so large, it cannot be analyzed using standard means of examination. more
Pioneering cryptographer Whitfield 'Whit' Diffie has joined the Internet Corporation for Assigned Names and Numbers (ICANN) as Vice President for Information Security and Cryptography. Diffie will provide advice on general security matters related to ICANN's mandate, and to ICANN in the design, development and implementation of security methods for ICANN-managed networks. He will oversee the continuous improvement and 'best practices' process for information security and cryptography. more
AT&T’s CEO plays down the threat of satellite cellular, citing bandwidth and coverage limits. Yet growing interest in rural and IoT applications suggests the technology could still claim valuable niches in the wireless market. more
The digital market has matured over the last 20 years, and it is no longer an excuse for governments to do nothing with the aim to let new markets and innovations emerge without immediate regulatory oversight. It has become clear this period is now well and truly over. The European Commission has already launched several lawsuits against the digital giants. Regulation, in general, is known as "ex-post" (after the deed has been done). This is set to change, as I will explain later. more
Google has announced that it is working to bring high-speed internet to Cuba, one of the world's least-connected countries. In a blog post published Monday, the company said it is bringing Chromebooks, Cardboard virtual reality kits, and other Google products to the Museo Orgánico Romerillo in Havana, where they will be connected to an internet network operated by the government-owned carrier ETECSA. more
China aims to provide broadband access to all urban and rural areas by 2020, according to the State Council. It is the first time for the country to announce a specific timetable for the development of broadband as "a national strategy," according to the announcement. By 2015, half of the Chinese households are expected to use fixed broadband, 3G mobile coverage rate is expected to reach 32.5 percent, and fiber-to-home services will cover all urban areas. more
Comcast has reached an agreement to acquire Time Warner Cable, according to a tweet from CNBC reporter, Dave Faber. The new company, based on the $44 billion purchase, will be by far the largest cable provider in the U.S. with over 33 million subscribers, and is assumed to face tough review from the Federal Communications Commission. more
New security report has revealed at least 48 companies involved in research, development, manufacturing of chemicals and advanced materials have been victims of a coordinated cyberattack traced to a source in China. The purpose of the attacks, code named Nitro, appear to be industrial espionage, collecting intellectual property for competitive advantage, according to Symantec. more
A study comparing best-of-breed computer security vendors suggests more than half of active malware and phishing threats on the Internet go undetected, with an average detection rate of 37% for malware and 42% for phishing. "Given the dynamic nature of today's online threats and the traditionally reactive approach taken by today's malware and phishing detection technology, conventional signature-based solutions are inherently at a disadvantage to keep up," said Panos Anastassiadis, CEO and Chairman of Cyveillance. "Because the majority of damage occurs during the first 24 hours of an attack, early detection of attacks is crucial." more