The ICANN Security and Stability Advisory Committee (SSAC) and the Internet Society Deploy360 Programme are planning a DNSSEC and Security Workshop during the ICANN67 meeting held from 07-12 March 2020 in Cancun, Mexico. The original DNSSEC Workshop has been a part of ICANN meetings for many years and has provided a forum for both experienced and new people to meet, present, and discuss current and future DNSSEC deployments. more
Cuban President Miguel Díaz-Canel addressed the first annual meeting of Cuba's IT professional society, the Unión de Informáticos de Cuba. In his talk, Díaz-Canel announced that four Cuban organizations - the Havana City Historian's Office, the University of Computer Sciences (UCI), Infomed, Cuba's medical network, and the Ministry of Culture had signed memoranda of understanding (MOUs) with Google. more
ICANN has appointed IID President and CTO Rod Rasmussen to its Security and Stability Advisory Committee (SSAC). An area that Rasmussen's work and recent SSAC reports have both covered in-depth is domain name hijacking. Recent hijackings against UFC.com and Coach.com, and similar past attacks against CheckFree, Comcast and Twitter have heightened awareness about the security dangers with the Internet's infrastructure. more
The Applicant Auction team is heading to ICANN 48 in Buenos Aires this month, and as we start to pack our bags, we thought it was time to share some updates with the community. Last week, ICANN held a webinar to present Auction Rules for its forthcoming Last Resort Auctions. more
The newly released handbook applies the practice of international law with respect to electronic warfare. The Tallinn Manual on the International Law Applicable to Cyber Warfare -- named for the Estonian capital where it was compiled -- was created at the behest of the NATO Co-operative Cyber Defence Centre of Excellence, a NATO think tank. It takes current rules on battlefield behaviour, such as the 1868 St Petersburg Declaration and the 1949 Geneva Convention, to the internet, occasionally in unexpected ways. more
How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more
The death of Thailand's King Bhumibol Adulyadej has led to stores running out of black and white clothing as the population mourns its leader in color-appropriate clothing. What does this mean for website localization? ...Web localization isn't just about creating a localized website and forgetting about it. It's about creating a living and breathing website that responds quickly to local events. Web localization is about respect. more
In the winter of 2014 I wrote a blogpost under the title 'Luddites of the 21st century unite?' (read here). In the post I wondered where the 21st century Luddites were. ICT, automation, artificial intelligence all threatened jobs, yet all those affected embraced smartphones and the Internet in droves. It seems I found them, but what to do? Brexit and Luddites Fast forward to early summer 2016. more
Internet 2009 in numbers as reported by Royal Pingdom: In 2009 there were 90 trillion emails sent; 100 million new email users; 24 percent increase in spam; 47 million new websites; 8 percent increase in domain names with the total reaching 187 million; 18 percent increase in overall Internet users with the worldwide total reaching 1.73 billion; and new zombie computers created reach 148,000 per day. more
This move will allow the company to separate its call routing services for telecom carriers from its marketing and security related services. Additionally the company has indicated that the latter unit, that is marketing, security, and data services, will be rebranded. more
As is normal with a change of administration, there are articles in the press discussing the likely legacy of the outgoing administration. Leading the pack in singing his own praises is former FCC Chairman Ajit Pai, who recently published this document listing a huge list of accomplishments of the FCC under his Chairmanship. Maybe it's just me, but it feels unseemly for a public servant to publish an official self-praise document. more
Germany is trying to beef up its cyber defense, after the interior minister called for rules that allow nations to attack foreign hackers targeting critical infrastructure. more
"Activists and academics are calling on Canada's privacy commissioner to investigate after an executive order from President Donald Trump last week stripped Canadians and other foreigners of the limited digital privacy protections they had enjoyed previously in the U.S," Daniel Tencer reporting in the Huffington Post. more
We recently received an email from a customer asking about hybrid DDoS mitigation and its ability to stop large application layer attacks. Here's the truth: Hybrid DDoS mitigation works and can stop large application layer attacks. Hybrid DDoS mitigation typically involves a purpose-built DDoS mitigation appliance or software on dedicated hardware that sits immediately in front of or behind an enterprise's edge router. more
Companies are no longer afraid of the cloud. Big talk about security and performance issues has dwindled to small voices as enterprises and SMBs alike adopt cloud services to empower their global impact. Big cloud benefits, however -- agility, scalability and on-demand access -- are the result of a thoughtful, well-planned move from on-site servers to off-site resources. Here are four key tips for a soft cloud landing. more