/ Most Viewed

New Threats Demand a New Approach to DDoS Protection

In the past 24 months, distributed denial of service (DDoS) attacks have changed profoundly. Gone are the days when attackers worked under the radar, when machines were infected by botnet code unknowingly and attacks were disguised leaving very little to trace the exact origin. ... The other game-changer: It's easier than ever to execute attacks. The tools are so widely available that anyone with basic skills and a high-speed connection can become a "hacktivist." more

The Secure 5G and Beyond Act – U.S. Credibility and Legal Requirements at Stake

The Secure 5G and Beyond Act of 2020 has been submitted by the U.S. Congress to the White House for signing into law. It has been sitting there for several days now, but there are obviously more important developments demanding attention than a law compelling the Executive Branch to develop a 5G security strategy within 180 days through public and Federal agency consultations that will be implemented by the NTIA. more

Building a More Secure Routing System: Verisign’s Path to RPKI

At Verisign, we believe that continuous improvements to the safety and security of the global routing system are critical for the reliability of the internet. As such, we've recently embarked on a path to implement Resource Public Key Infrastructure (RPKI) within our technology ecosystem as a step toward building a more secure routing system. In this blog, we share our ongoing journey toward RPKI adoption and the lessons we've learned as an operator of critical internet infrastructure. more

US Presidential Candidate John Delaney Wants to Create Department of Cybersecurity

On Tuesday, 2020 U.S. presidential candidate John Delaney announced a plan to create a Department of Cybersecurity. more

Cisco Introduces Intent-Based Network That Can Learn, Adapt and Mitigate Threats

Cisco has launched an intent-based networking solution designed to be intuitive and adapt; a new approach claimed to be one of the most significant breakthroughs in enterprise networking. more

U.S. Senators Push for Federal Oversight of Advanced AI Systems

Senators Hawley and Blumenthal propose a bipartisan bill requiring federal evaluation of advanced AI systems, aiming to prevent misuse while balancing national security, civil liberties, and technological competitiveness. more

Multi-Layer Security Architecture - Importance of DNS Firewalls

In today's world with botnets, viruses and other nefarious applications that use DNS to further their harmful activities, outbound DNS security has been largely overlooked. As a part of multi-layer security architecture, a DNS Firewall should not be ignored. After serving as a consultant for multiple organizations, I have encountered many companies that allow all internal devices to send outbound DNS queries to external DNS servers - a practice that can lead to myriad problems. more

Spectrum and Weather Forecasting

There is currently a brewing controversy over the allocation of various radio frequencies for 5G that could have a negative impact on weather forecasting. Weather forecasting has become extremely sophisticated and relies on masses of data gathered from weather satellites and other data-gathering devices. The masses of data, along with modern supercomputers and data center computing, have significantly improved the ability to predict future weather. more

The EPDP Passed an Important Milestone… Now What?

This isn't the blog post I had hoped to write. When I signed up to participate in ICANN's Expedited Policy Development Process for gTLD Registration Data, I knew we had a lot of work ahead of us, but I was cautiously optimistic that we would, eventually, reach a successful outcome. Today, I find myself looking at things differently. After hundreds of hours and countless meetings and emails, Phase 2 of the EPDP's work has wrapped up with the delivery of our final report to the GNSO Council. more

A History of Disruptors: Or How the U.S. Government Saved the Internet from the Telcos

Kenji Kushida is a scholar at Stanford University, who has written a most explanatory overview of how America came to dominate cyberspace, through computer companies. He traces the evolution of the Internet to a series of actions taken by the US government to limit the power of the telephone companies. Kushida looks at the USA, Europe and Japan from the perspective of what happened when telephone monopolies were broken up and competition introduced in the 1990s. more

5G a Fizzle With Consumers

The cellular companies have made an unprecedented push to get customers interested in 5G. Back in November, I recorded a college football game that enabled me to go back and count the twelve 5G commercials during the game. Advertising during sports events is relatively expensive, so these ads were not purchased at bargain-basement prices. The amount of money being spent on advertising 5G must be gigantic. more

Implications of Satellite Being Broadband

We've had a quiet policy change in the United States over the last year, where satellite broadband is starting to be considered broadband by the federal government. Any rural household that subscribes to and loves Starlink would wonder why this is news, but from a policy perspective, it is a big deal. I've been considering what this shift might mean in the future. The FCC decided that Starlink wasn't broadband when it rejected Starlink's long-form filing in August 2022, where Starlink wanted to claim the funding it had won in the RDOF reverse auction.  more

Brand Control: The Next Stage for Digital

Social and Digital Marketing are two of the fastest growing, and arguably the most important, pieces of branding today. According to eMarketer, 2017 digital marketing expenditures will account for 38.4% of total ad spending and are projected to be almost 45% by 2020. This is double what they were just a few years ago and growth doesn't seem to be slowing down. more

Carrier Hotels: The Unsung Critical Part of Broadband Connectivity

Today's blog talks about a critical part of the broadband network that most people don't know about -- carrier hotels. These are locations that have been created for the specific purpose of allowing carriers to connect to each other. The need for carrier hotels became apparent in the year after the passage of the Telecommunications Act of 1996. That new law allowed local competition for telephone service. more

Government Shutdown Halts Trump’s FCC Deregulation Agenda, Says Tom Wheeler

Former FCC Chairman, Tom Wheeler, warns that the effect of U.S. government shutdown on the Trump Federal Communications Commission (FCC) will last a long time even if the shutdown were to end tomorrow. more