I read, with some small amount of discomfort, an article by Bill Brenner on CSO Online, wherein he interviewed several other CSOs and other "Security Execs" on their opinions on the firing of Pennsylvania CISO Robert Maley. For those who haven't heard about this, Mr. Maley was fired for talking about a security incident during the recent RSA conference without approval from his bosses. more
I was hoping that McCain's Tech Policy would emphasize and extend the two McCain pro-Internet initiatives -- the McCain Lautenberg Community Broadband Act and Spectrum Re-regulation, neither of which have yet seen the light of day -- but it doesn't. In the first case, it makes a vague nod in the direction of "market failure and other obstacles." In the second, it treats spectrum policy as a done deal; now that we can surf the Web in coffee shops, we're done. more
Tuesday June 29th at the Cisco Live Conference Las Vegas, John Chambers announced their newest product, the Cius tablet aimed at the enterprise market and positioned as a mobility product. That very same day a two hour IPv6 deployment panel, moderated by Cisco's Alain Fiocco, featured Google, Microsoft, Comcast and Tata Communications in front of a room filled to near capacity. The nature of the audience was interesting. Compared to previous years, when asked about their affiliation, the number of hands raised for the category 'enterprise' was significantly higher. more
According to The Wall Street Journal, a company called O3b Networks LTD Traditional is planning to launch up to 16 satellites by the end of 2010 to provide Internet access in Africa, the Middle East, and parts of Latin America. This satellite plan, unlike many others, could be good. These are low earth orbit satellites or LEOs so they will be able to avoid the latency problems which are unavoidable with the geostationary satellites used by companies like WildBlue and Hughes to provide "last resort" Internet access in the US. more
Public Interest Registry is the industry leader of DNS Anti-Abuse efforts on the Internet. Since our inception, we have worked to empower people and organizations that use the Internet to make the world a better place. Whether a .ORG is the foundation of an individual voice, a global non-profit, or any organization that is part of the mission-driven .ORG community, we are proud to have earned the trust of so many dedicated users. more
The Internet Society (ISOC) will present an INET Regional Conference today June 14 2011 at the Sentry Center in NYC. The theme is "It's your call. What kind Of Internet do you want?". The distinguished line up of speakers will include 'Father of the Internet' Vint Cerf, World Wide Web inventor Sir Tim Berners Lee, and Assistant Secretary for Communications and Information at the U.S. Department of Commerce Lawrence Strickling. more
Eric Yuan, CEO of the Zoom teleconferencing service, stated that the average number of daily meeting recipients increased from 10 million in December 2019 to 200 million in March 2020 in a webinar last month. I've been teaching 21 students using Zoom as a result of the COVID-19 pandemic, and the audio and video are smooth, and switching between speakers is seamless. Offhand, I cannot think of any technology that has scaled so well so fast. more
Major US bank Capital One Financial Corporation confirmed Monday evening that unauthorized access was made by an outside individual who obtained "certain types of personal information" on credit card products and Capital One credit card customers. more
The Conficker worm will be active again on April 1st, according to an analysis of its most recent variant, Conficker.C, by the net security firm CA. This malicious piece of software, also known as Downup, Downadup and Kido, spreads among computers running most variants of the Windows operating system and turns them into nodes on a multi-million member ‘botnet’ of zombie computers that can be controlled remotely by the worm’s as yet unidentified authors. more
The news that Comcast, Time Warner, and AT&T are all considering capping use of their networks -- so that "overuse" would trigger a charge -- has prompted intense discussion of just why these network operators are moving in this direction. One camp suggests that these operators have to do *something* to manage congestion, and because any protocol-specific discrimination plan raises howls of protest from the Net Neutrality side of the fence adopting bit-usage discrimination schemes is inevitable. It's the least-bad approach, following this view. more
I have often argued that in both the fixed and the mobile telecoms markets the actual telecoms element is a utility -- a utility that allows for an enormous range of new services, new business models and new applications. For this reason the argument for more than a decade (since 2002 to be precise) has been that structural separation of the vertically-integrated telecom model is needed in order to unleash the huge potential of telecoms. If that doesn't happen technologies will be applied that allow the users to bypass the barriers set up by the telcos to protect their utility. more
Brendan Sasso reporting in the Hill: "Julius Genachowski, chairman of the Federal Communications Commission (FCC), issued a statement late Wednesday slamming Russia for passing a bill that would allow the government to blacklist certain websites. He said the country had moved in a 'troubling and dangerous direction.' ... 'The world’s experience with the Internet provides a clear lesson: a free and open Internet promotes economic growth and freedom; restricting the free flow of information is bad for consumers, businesses, and societies,' he said. more
The Mexico City ICANN Conference was more eventful than some of us had anticipated. Among the highlights was Paul Twomey's announcement that he is stepping down as President and CEO of ICANN effective on June 30... Before the Conference, ICANN had released the second draft of its Guidebook for new generic Top-Level Domains (gTLDs). It was not greeted with universal acclaim... more
Businesses should consider bumping phishing as an urgent concern in their cybersecurity agendas. To those still unacquainted, "phishing" refers to the use of fake emails, messages, and websites that fool users into giving up access to accounts and information or into installing malware through attachments. It has become quite rampant over recent years. Attackers are using the method as a primary means to breach defenses, and with good reason: they work. more
As the Internet has grown, so too have the abuses that go along with one of the world's most transformative technologies. For all of the positives the Internet brings, negatives like phishing, malware and child exploitation are a reality online. As of December 9, 2019, 48 registrars and registries have signed onto the "Framework to Address Abuse." This initiative was launched last month by a number of domain name registries and registrars, just prior to the ICANN meeting in Montreal. more