/ Most Commented

How to Manage and Secure Big Data

Several developments are coming together in cloud computing that are creating shockwaves throughout society and in the economy. Over the last five years we have seen the debate about cloud computing hotting up. There was the hype around the new development at the same time as warnings regarding security and privacy, and for a while the market seemed subdued about the new development. However the economic reality of cloud computing meant that enterprises and government bureaucracies had little choice but to move ahead with cloud computing... more

INET DC, Weds, July 24: Surveillance, Cybersecurity and the Internet’s Future (Livestream available)

Are you concerned about the recent reports about government surveillance programs? Are you concerned about security and privacy online? If so, you may want to attend (in person or remotely) the INET Washington DC event happening on Wednesday, July 24, from 2:00 - 6:00 pm US Eastern time at George Washington University. Sponsored by the Internet Society and GWU's Cyber Security Policy and Research Institute, the event is free and open to the public and will also be streamed live on the Internet for those who cannot attend in person. more

Google Not the Only Company Testing Wireless Access by High-Altitude Balloons

Oceus Networks Inc., a mobile 4G LTE broadband networking provider, recently demonstrated the efficacy of a deployable 4G LTE solution on a high-altitude balloon platform, which can be used to rapidly provide broadband coverage and communications services to first responders within the first 72 hours following an emergency or natural disaster. more

The Bandwidth Bank

This is a topic that we have discussed on several occasions over the last decade, but it now seems as though things are slowly moving forward. A new company, Intabank, has set up a service whereby its enterprise customers can pool bandwidth that the intermediate company can then use to sell to other customers; enabling organisations to monetise their network connectivity assets. more

Google Serving 25 Percent of Consumer Internet Traffic Through North American ISPs

Google is now serving close to 25 percent of all consumer internet traffic running through North American ISPs, according to a report from Wired. "That's a far larger slice of than previously thought, and it means that with so many consumer devices connecting to Google each day, it's bigger than Facebook, Netflix, and Instagram combined. It also explains why Google is building data centers as fast as it possibly can. Three years ago, the company's services accounted for about 6 percent of the internet's traffic." more

A Note on Subscriptions with Introductory Pricing

Over the years, I've kept tabs on residential Internet services in my local area (Vancouver, BC) and noticed that almost all providers have the following "limited time offer"... On the surface, this sounds like a great way to entice users to sign up -- or more importantly, switch over. But are we missing something here? After the initial discounted rate, subscribers receive a friendly reminder of what their subscription actually costs. And chances are, they're not going to be happy with their next bill. more

How Registrants Can Reduce the Threat of Domain Hijacking

Because domain names represent the online identity of individuals, businesses and other organizations, companies and organizations large and small have expressed increasing concern over reports of "domain name hijacking," in which perpetrators fraudulently transfer domain names by password theft or social engineering. The impact of these attacks can be significant, as hijackers are typically able to gain complete control of a victim's domain name - often for a significant period of time. more

Tactics for Responding to Cyber Attacks - Squeezing Your Cyber Response-Curve: Part 1

Many cyber attacks against companies today go unreported, and more still are undetected... Timing and context are everything. The faster a company identifies a problem, and the faster and deeper it is understood and its relevance to the business, the more effectively the company can respond. We call this squeezing the cyber response curve. This two-part post will discuss the current state of cyber threats, what the cyber response curve is and its impact your organization and how you can effectively squeeze this curve to improve attack response. more

ICANN Chairman’s Durban Roundup

Respected ICANN Chairman of the Board Steve Crocker has wrapped up his organisation's 47th International Meeting, held in Durban last week, with a message to the community. This message, reproduced here in its entirety, provides both a useful and concise summary of the Durban meeting and insights into the Chairman's view of where ICANN stands at the moment, the successes it has notched up and the challenges it faces. more

DNS, DNSSEC and Google’s Public DNS Service

For some time now we've been tracking the progress of the deployment of DNSSEC in the Internet. Its been a story of an evolution of the measurement technique... In the process we've learned perhaps more than we had wanted to about the behaviour of Flash engines, Apache web servers and FreeBSD system tuning, and also learned much more than we had anticipated about the finer details of Google's online ad presentation behaviour. But one thing we did not see in all of this was any large scale jumps in the level of client use of DNSSEC validation over this period at the start of the year. more

Can a CDN Help Website and Application Performance?

Before we answer the question, "Can a CDN help your website and application performance," let's take a moment for a short CDN 101. A CDN (content delivery or content distribution network) is a system of computers placed at different network nodes to provide the same content from the shortest distance possible. In other words, a CDN attempts to take pieces of content from your website and pass it to various nodes around the Internet. more

ISOC Joins Forces with Shinkuro and Parsons to Promote Global Deployment of DNSSEC

The Internet Society today announced it has signed a Memorandum of Understanding with Shinkuro and Parsons to collaborate on multiple initiatives to promote the global deployment of Domain Name System Security Extensions (DNSSEC). more

Over 100 gTLD Applications Committed in Aug. 13 Applicant Auction

In early June, the first Applicant Auction resolved contention for 6 contested gTLDs. The successful outcome of that auction has generated a great deal of interest from other applicants, and Innovative Auctions is expecting a big turnout in our next auction, to be held on August 13th. For more than half of the contested applications, at least one applicant is ready to resolve contention via our auction. more

First “Africa DNS Forum” To Be Streamed Live July 12 and 13 From Durban, South Africa

The first Africa DNS Forum will take place on Friday, July 12, and Saturday, July 13, 2013, in Durban, South Africa, in advance of next week's ICANN 47 meeting. Jointly organized by AfTLD, ICANN and the Internet Society, the Africa DNS Forum "aims to establish a platform for the DNS community across Africa and to advance the domain name industry and domain name registrations on the continent."  more

Passwords Are Not Enough: Without Two Factor Authentication Your Business Is At Risk

Passwords are no longer sufficient to maintain an adequate level of security for business critical infrastructure and services. Two-factor authentication should be considered the minimum acceptable level of access control. There have been two types of security stories in the technology news over the last few months that should be of particular concern to system administrators and those responsible for maintaining business network infrastructure. more