/ Most Viewed

Internet Security and the Multistakeholder Approach: Is It Attainable?

Internet Security is a topic that has drawn a lot of attention over the past year. As awareness grows that cooperation is necessary, it dawns on people that there are many and very different stakeholders involved, stakeholders that may never have met before. Let alone have cooperated. An example of an approach is the National Cyber Security Council (NCSC) that was installed in The Netherlands on 30 June. This is a high level council that will give advice to public as well as private entities on how to better secure themselves and society at large against cyber attacks and how to become more resilient. However, without the right approach it is doomed to become a talking shop. more

Should You Whitelist Your Vulnerability Scanning Service Provider?

Unlike consultant-led penetration testing, periodic or continual vulnerability scanning programs have to operate harmoniously with a corporation's perimeter defenses. Firewalls, intrusion prevention systems, web proxies, dynamic malware analysis systems, and even content delivery networks, are deployed to protect against the continuous probes and exploit attempts of remote adversaries -- yet they need to ignore (or at least not escalate) similar probes and tests being launched by the managed security service providers an organization has employed to identify and alert upon any new vulnerabilities within the infrastructure or applications that are to be protected. more

No Virginia, You Have No Duty to Secure Your WiFi Access Point

Every now and again a report flies across the network about the police breaking down someone's door and attempting to arrest the home owner for bad things online - assuming that whatever happened from that person's Internet connection is their fault. Now there are lots of problems with this - lots of problems. But one of the big ones is that anyone can access an open access point... more

Searching for Truth in DKIM: Part 2 of 5

In part 1, we explained that the DKIM "d=" value identifies the domain name which signed the message, which may be a different domain name from the author of the message. Tying the signing and author domains together will require an additional standard: Author Domain Signing Practices (ADSP). In IETF parlance, the "author domain" is the domain name in the From: header, so ADSP is a way for the author domain to publish a statement specifying whether any other domain name should ever sign a message purporting to be From: that author domain... more

T-Mobile Breaks Upload Speed Record with New 5G Dual Connectivity

T-Mobile has claimed a new world record in 5G upload speeds, achieving an impressive 2.2 Gbps in tests conducted at California's SoFi Stadium. Partnering with Ericsson and Qualcomm, the telecommunications firm leveraged an emerging technology, 5G Dual Connectivity (5G DC), which combines mid-band and millimeter-wave (mmWave) spectrum bands. more

Deja Vu All Over Again: Cables Cut in the Mediterranean

The end of the year is approaching which seems to be a harbinger of Internet disasters. Four years ago (on 24 Dec. 2004), TTNet significantly disrupted Internet traffic by leaking over 100,000 networks that were globally routed for about an hour. Two years ago (on 26 Dec. 2006), large earthquakes hit the Luzon Strait, south of Taiwan, severing several underwater cables and wreaking havoc on communications in the region. Last year there was a small delay. On 30 Jan. 2008, more underwater cables were severed in the Mediterranean, severely disrupting communications in the Middle East, Africa, and the Indian subcontinent. Calamity returned to its customary end-of-year schedule this year, when early today (19 Dec. 2008) several communications cables were severed, affecting traffic in the Middle East and Indian subcontinent. more

2016 New gTLD Year in Review (Infographic)

This post provides an overview of The 2016 New gTLD Year in Review infographic, reflecting on some of the intriguing highlights of the gTLD industry. The data analyzed within the infographic is based on the following: New Top Level Domains (TLDs) contained in the data set reflect open TLDs and exclude single registrants such as brands; For greater insight, TLDs have been separated into four quartiles or 'tiers' with tier 1 being the top 25% and tier 4 being the bottom 25%... more

The Battle for IoT

There is an interesting battle going on to be the technology that monetizes the control of Internet of Things devices. Like a lot of tech hype, IoT has developed a lot slower than initially predicted -- but it's now finally becoming a big business. I think back to a decade ago when tech prognosticators said we'd soon be living in a virtual cloud of small monitors that would monitor everything in our life. According to those early predictions, our farm fields should already be fully automated, and we should all be living in the smart home envisioned by the Jetsonsmore

Come to the First Ever Dedicated New gTLD Conference: .nxt

Sometimes the heavens align. With the release of a number of resolutions from the ICANN Board on Sunday, we learnt two things: One, that there is a determined drive to get the rules for new Internet extensions, gTLDs, finalized in December at a meeting in Cartagena. And two, that the meeting immediately after that - in March 2011 - will be held in San Francisco. more

Domain Registry/Registrar Cross Ownership: A Reality Check

Funny how marketplace reality can poke holes in claims and theories. A debate is raging between some existing registries (Afilias, PIR, Neustar) and registrars like ourselves over the issue of 'cross-ownership' in Top-Level Domains (TLDs). At question: should the same set of shareholders be allowed to own all or part of a registry as well as a registrar that sells names in the TLD owned by the registry? These registries are saying 'no', and one of their principal objections is they think current registrars have an unfair advantage in pursuing TLD deals. more

Computing Clouds in Orbit – A Possible Roadmap

Last week, I predicted that much of the Internet and most cloud datacenters would launch into space in the next ten years. Today the only part of the Internet in space is a very small amount of "bent-pipe" access: signals which go from a user to a satellite and bounce back down to a ground station which feeds them into the terrestrial internet where all processing is done and all queries answered by internet-connected servers, many of them in cloud data centers. more

Phish or Fair?

It shouldn't be a big surprise to hear that phishing is a big problem for banks. Criminals send email pretending to be a bank, and set up web sites that look a lot like a bank. One reason that phishing is possible is that e-mail has no built in security, so that if a mail message comes in purporting to be from, say, accounts@bankofamerica.com, there's no easy way to tell whether the message is really from bankofamerica.com, or from a crook. more

The Senate Should Take the DOTCOM Act Off Cruz Control

Recently we speculated on the question "Will 2016 Politics Trump Bipartisan Support for the MSM and DOTCOM Act?" That article discussed the possibility that the Obama Administration's decision to relinquish ICANN stewardship via the periodic re-awarding of the IANA functions contract might arise in the ongoing U.S. Presidential sweepstakes, most likely from a Republican entrenched in the far right wing of that Party. We also discussed whether its introduction might erode the currently broad and bipartisan Congressional acceptance of the transition... more

Fact Checking the Recent News About Google in Cuba

Google's Cuba project has been in the news lately. Mary Anastasia O'Grady wrote a Wall Street Journal article called "Google's Broken Promise to Cubans," criticising Google for being "wholly uninterested in the Cuban struggle for free speech" and assisting the Castro government. The article begins by taking a shot at President Obama who "raved" about an impending Google-Cuba deal "to start setting up more Wi-Fi access and broadband access on the island." more

World’s Critical Infrastructure

After all the unexplainable outages that undersea cables have severed, I thought it would be essential to highlight a brief history about who owns the oceans including some pointers about global undersea communication cables aka world's critical infrastructure. more